How To Earn An “A” In Network Security

Posted by Drew Paik

May 18, 2015

img_2015-04-20_Dark-Reading

NEWS

At a recent DHS summit, the department’s director of software and supply chain assurance, Joe Jarzombek, presented a critical assessment of public and private organizations’ security measures. According to Jarzombek, organization’s have done a solid job fixing software defects and managing their adverse effects. However, when it comes to protecting organizations from hackers and thieves, Homeland Security isn’t handing out any gold stars.

Topics: News

Monthly News Roundup - April 2015 (TL;DR)

Posted by Drew Paik

May 1, 2015

img_2015-04-01_Dark-Reading

NEWS

It’s time to get back to basics -- that’s the takeaway in this month’s InfoSec news. Among the headlines: a simple phishing scam hacked the White house, teamwork undermined a criminal botnet, and unpatched networks are vulnerable to attack (duh!). Here are the highlights from April:

Topics: News

Authentic8 Expands Browser Misattribution Capabilities for Infosec Researchers

Posted by Ramesh Rajagopal

Apr 21, 2015

img_2015-04-21_Marketwired

CORPORATE

MOUNTAIN VIEW, CA--(Marketwired - Apr 21, 2015) - Authentic8, maker of Silo, the cloud-based secure browser for business, has extended the spoofing capabilities of its Toolbox configuration. Toolbox is a programmer's version of Silo, configured to route traffic through a network of global exit nodes, with features including code analysis and packet capture tools.

Topics: Corporate News

All it takes is one click, and then it’s “Спасибо, Обама!” (“Thanks, Obama!”)

Posted by Drew Paik

Apr 10, 2015

2015-04-10__Business-Insider

NEWS

This week, there was news that some sensitive information (including details of President Obama’s schedule) were stolen by Russian hackers. Whether you work in the White House or are a plumber from Ohio, the browser has become the most important application on your computer. But it’s also the most vulnerable. A single click on the wrong URL can spiral into an embarrassing and costly data breach.

Topics: News

Monthly News Roundup - March 2015 (TL;DR)

Posted by Drew Paik

Mar 31, 2015

img_2015-03-17_SC-Magazine

NEWS

March 2015 was a month marked by global security exploits and the beginning of the end for an old browser friend, Internet Explorer. Well, when it came to Internet security, maybe IE was always more of a “frenemy.” All that and more in this month’s news roundup:

Topics: News

Is it time for a re-think of the traditional browser model?

Posted by Scott Petry

Mar 30, 2015

img_2015-03-30_Pwn2Own

SECURITY

At this year’s Pwn2Own competition, white hat hackers exposed security flaws in the Web’s leading browsers. With over a half a million dollars in cash and prizes at stake, Pwn2Own is the Super Bowl of hacking. In a mere two days of competition, individuals and teams from around the globe cracked Internet Explorer, Firefox, Safari, and Google Chrome, as well as the Adobe Reader and Flash Player plug-ins.

Topics: Security

Protecting Yourself from PDFs

Posted by Josh Brotheim

Mar 25, 2015

img_2015-03-25_PDF

SECURITY

Recently a user contacted me with a question on how best to protect himself from PDFs of unknown origin that may have malicious payloads. He had found a PDF on a topic he was researching but as he did not know or trust the site he was concerned about exposing his own device to potential nastiness.

Topics: Security

People Hate Change… So, We Changed.

Posted by Scott Petry

Mar 16, 2015

img_2015-03-16_Web-Portal

CORPORATE

Change equals stress. It’s an equation taught in freshman psychology classes. We know this fact on an intuitive level. It’s the reason why workers prefer to stick to familiar things like, say, their old browsers despite all the inherent risks.

We understand. We sometimes struggle with change, too, but never when it comes to our desire to help organizations use the Web without being hijacked by Internet crooks and vandals. To reach our goal, our team must be willing to change and adapt.

Topics: Corporate News

FREAK attack unearths yet another SSL vulnerability

Posted by A8 Dev Team

Mar 12, 2015

img_2015-03-12_FREAK

SECURITY

TL;DR If you're using Authentic8 Silo, you are safe from the FREAK attack. Last week, the discovery of the FREAK attack against SSL/TLS was publicly announced. FREAK is one of several serious attacks against SSL/TLS -- the encryption protocol securing most Internet communications. Other major bugs and attacks in recent years include BEAST, CRIME, Heartbleed, and POODLE.

Topics: Security

Authentic8 Integrates Content Controls Into Silo Cloud Browser

Posted by Ramesh Rajagopal

Mar 12, 2015

img_2015-03-12_Marketwired

CORPORATE NEWS

MOUNTAIN VIEW, CA--(Marketwired - Mar 12, 2015) - Authentic8, maker of Silo, the cloud-based secure browser for businesses, has integrated flexible content controls into Silo so organizations can enforce acceptable use policies to govern users' online activities.

Topics: Corporate News

The official blog of Authentic8

Blog Home
Sign up for Silo
Contact Us

Subscribe to Email Updates