illustration of laptop with browser that lacks visibility leading to different malware and web threats

Browsing blind: Understanding the dangers of limited browser visibility

The browser has emerged as the most widely used enterprise application today. That’s good news for users who need to access corporate data and business tools from anywhere with a reliable Internet ...
illustration of websites on fishing hooks with text LURE

How Legacy URL Reputation Evasion (LURE) attacks easily bypass current security tech

Whether it’s the push for fully remote work, in-office work, or a hybrid workstyle, the conversation around how and where employees will work continues. But guess what? To cybercriminals, this conversation doesn’t ...
illustration of android person with laptop computer

Is AI revolutionizing cybersecurity? The answer isn’t as clear.

Peruse last quarter’s press releases from top cybersecurity vendors, and it’s hard to miss the focus on artificial intelligence (AI) and machine learning (ML). According to these vendors, traditional security tools are ...
AI's role in revolutionizing browser security

Breaking the misconception: Unveiling AI’s impact on browser security

To say artificial intelligence (AI) has been a buzzword in the security industry is a massive understatement. One thing’s for sure, there are often misconceptions surrounding AI’s true potential. In a recent ...
Illustration of robot stealing files from computer

The opportunities and risks of ChatGPT in cybersecurity

A lot of ink has been spilled over the past several months about the impact generative artificial intelligence (AI) platforms and chatbots like ChatGPT will have on cybersecurity. Many people, rightly so, ...
Illustration of class being taught in protective malware while cyber threats bounce off shield

Federal-level web security for K-12 schools: Isolation holds the key

I recently had an opportunity to catch a fascinating talk by Alaina Clark, assistant director for stakeholder engagement for Cybersecurity and Infrastructure Security Agency (CISA). A trusted advisor for security professionals in ...
zero-trust, browser, privacy isolation SASE browser Perception Point API data security Salesforce AppSec Changing Face of Web Application Security

Perception Point Makes Securing Browsers Simpler

Perception Point this week launched an alternative approach to creating sandboxes on Chrome and Microsoft Edge browsers that isolates browser sessions from potential web threats. Perception Point Advanced Browser Security leverages the ...
Security Boulevard
Datadog Web3 DNSSEC OPSWAT web application security

Can Web Security Tools Prevent Data Breaches?

For most, 2020 will go down in history as the year of the COVID-19 pandemic. The year that everything shut down, jobs were lost and social distancing became the ‘new normal.’ Unfortunately, ...
Security Boulevard
It doesn’t matter if you don’t use Internet Explorer, you could still be at risk from this IE zero-day vulnerability

It doesn’t matter if you don’t use Internet Explorer, you could still be at risk from this IE zero-day vulnerability

You might think that any security issues with Internet Explorer shouldn’t be much of a problem anymore. After all, most computer users have moved on to more modern alternative browsers like Chrome, ...
TOR, Mozilla Cozy Up

TOR, Mozilla Cozy Up

via Lucian Armasu, writing at Tom's Hardware, comes news of Project Fusion, a partnership - if-you-will of the Tor Project and Mozilla, in an effort to provision enhanced privacy and security to ...