Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

2018-08-22T09:27:13+00:00August 22nd, 2018|Threats|

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security concerns The clear majority of threats reaching endpoints today arrive via email attachments and browser file downloads Welcome to the second installment of [...]

Free Report | Incredible Research Reveals Cybercrime’s Complex Economy

2018-04-20T05:59:12+00:00April 20th, 2018|Company News, Research|

Ground-breaking study highlights emergence of Platform Criminality Cybercriminal profits are linked to drug production, human trafficking and terrorism We'll be talking a lot more about this research in the weeks to come. Get your copy of the free report Last spring, we contracted with an academic researcher who specialized in criminality from the University of [...]

Sex, Drugs and Toilet Rolls: How Cybercriminals Spend Their Money (infographic)

2018-04-11T05:36:43+00:00April 11th, 2018|Company News, Research|

We conducted an independent, academic study into how much money cybercriminals are earning and what they spend it on. The findings are part of a larger nine-month study titled Into the Web of Profit, sponsored by Bromium. The report is free and you can reserve your copy here.  This is part two of a two-part series based on [...]

Tax Free Criminal Cyber Profits Reveal Economic Hierarchy

2018-04-10T06:01:56+00:00April 10th, 2018|Company News, Research|

We conducted an independent, academic study into how much money cybercriminals are earning and what they spend it on. The findings are part of a larger nine-month study titled Into the Web of Profit, sponsored by Bromium. The report is free and you can reserve your copy here. This is part one of a two-part [...]

IDC’s Frank Dickson to Discuss Innovative Approaches to Cybersecurity [Webinar]

2018-02-07T06:00:37+00:00February 7th, 2018|Company News|

Frank Dickson, IDC Research Director, Security Products, authored the IDC Perspective, “Validating the Known: A Different Approach to Cybersecurity” Join this live webinar on February 22 to hear Frank present his research and ask him your questions Frank’s report looks at alternatives to detection-based security, including application isolation We’ve invited Frank Dickson, IDC Research Director, Security [...]

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

2018-02-06T04:01:03+00:00February 6th, 2018|Company News|

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with increasingly sophisticated malware. The infographic below explains the only effective way to reduce threats is to render them harmless with virtualization-based application isolation. [...]

Get the Report: CISO Recommendations for Endpoint Security by Security Current

2017-12-19T07:45:33+00:00December 19th, 2017|Company News|

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. [...]

Cybersecurity vs Productivity: The CISO’s Dilemma

2017-10-23T06:09:38+00:00October 23rd, 2017|Company News|

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success [...]

Cybersecurity Doesn’t Just Happen, You Have to Get a Round Tuit (We Have One For You)

2017-07-31T08:05:06+00:00July 31st, 2017|Threats|

It's Monday. On the West Coast, Black Hat is over and if you traveled, you should be home. If you didn't travel, it's still Monday and there are things to be done. And August starts tomorrow - so you might be thinking, "Bah, let's get through August and then I'll refocus." Not so fast. This [...]

Turning Off Cybersecurity to Increase Productivity Shouldn’t Be How the Problem Gets Solved

2017-07-24T06:00:44+00:00July 24th, 2017|Company News|

It seems security teams are under a lot of pressure from the organization when it comes to the balance between productivity and staying secure. Our infographic below explains how this plays out: with some saying they turn off security and others modifying it. Cybersecurity shouldn't be this hard and it shouldn't impact end user behavior. [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close