Wait, don’t pay that invoice! You might be keeping a crook in business.

Posted by Scott Petry

Jan 27, 2015

img_2015-01-26_Network-World

NEWS

The FBI has issued a warning about a scam that tricks employees into paying invoices that appear legit, but are actually fraudulent. This scam, named the Business E-mail Scam (BEC), has caught the U.S. Government’s eye because of its increasing popularity.

In the past 14 months, reported victims of BEC rip-offs have lost over $200 million. And remember that as my co-founder wrote in Forbes last year, when a business is the victim of wire fraud, you can't always count on the banks making good again.

Topics: News

Cracks in the foundation: A look back on 2014

Posted by Scott Petry

Jan 14, 2015

img_2015-01-14_FoundationNEWS

Last year ended with a bang -- a devastating attack against Sony and a lot of finger pointing in the press. The fallout from the exploit will not only impact Sony’s IT posture, but as class action lawsuits pile up, Sony Entertainment will be dealing with the cleanup for a long time. These individual, high-visibility exploits create an awareness spike. But our attention doesn’t last. As soon as the press stops talking about it, people return to life as normal and take their computing for granted. As security professionals, we can’t afford to be distracted by the headlines.

Topics: News

A few words about privacy

Posted by Ramesh Rajagopal

Dec 30, 2014

img_2014-12-27_Twitter-Mitnick

CORPORATE NEWS

Over the weekend, Kevin Mitnick tweeted a comment after reading our privacy policy. I responded with a couple of tweets but thought a more comprehensive response was warranted, because he raises a good point.

Topics: Corporate News

Monthly News Roundup - November 2014 (TL;DR)

Posted by Drew Paik

Nov 30, 2014

img_2014-11-12_Ars-Technica

NEWS

Happy Thanksgiving! This month has been typically busy in the world of cyber-security. As we head towards the end of the year, and the holiday shopping season, experts are warning retailers to increase their vigilance. In a year that has seen widespread hacking of companies including Home Depot and Target, it stands to reason that we’ll see an uptick in attacks as shoppers get ready for the holidays. Here are some of the stories that piqued our interest in November:

Topics: News

Open source malware means more (and more dangerous) attacks

Posted by Scott Petry

Nov 24, 2014

img_2014-11-24_PhishLabs

NEWS

We’ve talked quite a bit about the increasing number of attacks being reported over the past few months. This is partially due to the increasing use of web apps and reliance on the browser as a way of accessing business information. But it’s also attributable to the increase in “open source” malware. As with key layers of the Internet stack, the source code of various exploits have been released by the authors, and other developers are building on that base.

Topics: News

Protect yourself from what you research!

Posted by Josh Brotheim

Nov 18, 2014

img_Isolation-Chamber-Kitten

CORPORATE NEWS

Re-imaged machines, local sandboxes, and even process emulation on the user’s device are common tactics researchers use to insulate themselves from the malicious content they need to capture and analyze. But if you step back and think of it, these approaches violate a core tenet of security research: they expose their local resources (e.g. IP address, network gateway, local servers, local machine) to the threat.

Topics: Corporate News

Authentic8 Enables Full Encryption of User Activity Log Data

Posted by Scott Petry

Nov 18, 2014

img_2014-11-18_Encrypted-Logs

CORPORATE NEWS

MOUNTAIN VIEW, CA--(Marketwired - Nov 18, 2014) - Authentic8, maker of Silo, the cloud-based secure browser for businesses, has extended logging capabilities to enable encryption of all usage and activity data with a customer-supplied key. In today's world of web-based services, customer data is scattered across a variety of third-party providers. And companies in industries where information needs to be closely managed don't have the tools necessary to remain in compliance when using cloud-based apps.

Topics: Corporate News

Are you sure you want to expose your location to the world?

Posted by Josh Brotheim

Nov 12, 2014

img_Global-Network

CORPORATE NEWS

You wake up and want to know the day’s weather. So you point your browser to weather.com and it gives you the weather forecast. Simple. But you never typed provided any information about where you are and the website somehow knew your location. How did it know?

Topics: Corporate News

Monthly News Roundup - October 2014 (TL;DR)

Posted by Drew Paik

Oct 31, 2014

img_2014-10-10_PopSci

NEWS

Happy November! October was Cybersecurity Awareness Month, and, perhaps fittingly, it was a busy one. As security experts continued to grapple with the fallout from Shellshock, a new infrastructural vulnerability surfaced. We also saw reports of new breaches affecting everything from Dropbox to Snapchat. Here’s the TL;DR on a few stories we found interesting:

Topics: News

Authentic8 Enhances Silo for Enterprise Information Security Researchers

Posted by Ramesh Rajagopal

Oct 23, 2014

img_2014-10-23_Marketwired

CORPORATE NEWS

MOUNTAIN VIEW, CA--(Marketwired - Oct 23, 2014) - Authentic8, maker of Silo, the cloud-based secure browser for business, has expanded its product capabilities to include resources designed for information security research, incident response, emergency readiness, anti-fraud, and more. Where Silo is designed to control the use of web-based services by executing in a sandbox and implementing data-level policy controls, the new configuration, called Toolbox, brings the same isolation but includes features necessary for researchers to do their jobs more securely.

Topics: Corporate News

The official blog of Authentic8

Blog Home
Sign up for Silo
Contact Us

Subscribe to Email Updates