<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

Day Zero and the Death of Whitelisting

>Zero Day

Why enSilo? Easy – because we stop zero-day malware on day zero.

I mean – lots of companies say they can stop zero-day malware, and truth be told, they probably can. But they’re not going to do it when it matters, which is on day...

Cyber-Security in 120 Secs: The Strike of IoT

This week we saw the impact of a huge DDos cyber attack that hit the Internet on Friday;  CVE-2016-5195 or "Dirty COW" a vulnerability that has lasted in Linux devices since 2007 was brought to the light;  LeakedSource exposes breaches for...

Cyber-Security in 120 Secs: PoS Malware Strikes Again

This week has seen at least one reported breach caused by a PoS malware for shoppers of Vera Bradley;  according to a SANS report, the financial sector’s #1 attack threat is reported to be ransomware, causing losses up to half-million...

No Penalty for Failure

If you have data of value – and you probably do – someone is eventually going to try to steal it. Because time and technology are usually on the side of the attacker, they’ll probably be successful. It doesn’t matter that you have the...

Cyber-Security in 120 Secs: Yahoo Breach Affects 500M

This week made breach history with at least 500 million Yahoo users being compromised 2 years ago; Cisco follow-up with the Shadow Broker exploit, only to discover yet another exploit affecting at least 840,000;  and ransomware, dubbed...

Cyber-Security in 120 Secs: Targeted Ransomware

In this week’s news, we recognize that funding stemming from malware is allowing threat actors to fine-tune malware, and be more targeted.  In this case, ransomware distributors are increasing monetary demands that are a reflection of the...

FindADetour: The Tool that Tests for Vulnerable Microsoft's Detours

Today’s Microsoft September Patch Tuesday includes a patch to what they had tagged as a fix for Microsoft Office. Behind the scenes, however, that fix extends beyond Microsoft Office to hundreds of applications developed by Microsoft as well...

Cyber-Security in 120 Secs: The OPM Breach Report

This week, the U.S. House Oversight & Government Reform Committee concluded in a report based on the timeline of the events that led to the OPM breach - “OPM jeopardized U.S. national security for more than a generation”, the White House...

Cyber-Security in 120 Secs: Voting Databases Get Targeted

This week we saw activity that may concern voters in the upcoming presidential election with 3 different voter databases reported being compromised; Dropbox and Last.fm were both breached in 2012 and decided to publish the number of users...

How is enSilo Taking on the Global Market? Read Our Fortune Article

enSilo is growing! ...and having an international cyber-security team is critical to our success.