Disposable Computing is the Answer to Cyber Security for Business

2017-06-20T12:12:48+00:00June 20th, 2017|Innovation|

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computing [...]

Our Bring Your Own Malware Challenge is Back!

2017-05-24T15:07:00+00:00May 24th, 2017|Company News, Threats|

We are hosting the Bring Your Own Malware Challenge at a series of upcoming events. Bring it to InfoSec in London, Gartner Security Summit in Maryland and of course, Black Hat in July. The rules are simple, you have to plan ahead, but we have a cash prize. That’s right. We’ll be hosting our BYOM [...]

Fresh Phish. (So Many Puns, So Little Time.)

2017-05-23T05:04:50+00:00May 23rd, 2017|Threats|

Today's phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly [...]

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

2017-05-19T18:05:24+00:00May 19th, 2017|Company News|

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a [...]

Signatures Not the Root of Prevention

2017-05-11T05:26:22+00:00May 11th, 2017|Breaking News|

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fallen victim to the same [...]

The Economist on the Cyber Security Industry

2017-05-01T04:37:06+00:00May 1st, 2017|Breaking News|

A recent copy of the Economist caught my eye with the front page headline of “Why computers will never be safe”. For a non-technical publication they have managed to give some great insight into the reasons why the security industry has a problem. The article calls out how profitable it is for hackers to exploit a vulnerability, [...]

Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream

2017-04-12T22:46:11+00:00April 12th, 2017|Company News|

We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Watch this webinar to learn more about what’s in the new release of Bromium Secure Platform. Virtualization-based [...]

Virtualization Based Security is Here – Prepare for Liftoff!

2018-08-10T13:55:58+00:00December 11th, 2016|Innovation|

Bromium is well known for its revolutionary approach of using micro-virtualization to solve the endpoint security challenge. Virtualization is the most secure method for isolating untrusted content and protecting users from the internet, email, USB, and other external sources. Even Microsoft has now embraced the concept by adding some basic micro-virtualization capabilities natively into Windows 10. [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close