Tweetovi

Blokirali ste korisnika/cu @TalZamir

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TalZamir

  1. 5. velj

    A great talk by at . I salute Microsoft for taking on the Herculean task of securing the 5.7 million (!!!) source code *files* of Windows. The only way to win this game is by adopting a security-by-design isolation paradigm.

    Poništi
  2. 5. velj

    VDI and DaaS (desktop-as-a-service) are back with Microsoft trying to push Windows Virtual Desktop and with Citrix servers hacked. It's a good time to look at these technologies from the security perspective. More details in our latest post:

    Poništi
  3. 15. sij

    Ouch. CVE-2020-0601 means attackers (not just nation state actors) can run any executable on your machine, bypassing code signing. They can also launch man-in-the-middle attacks, reading/modifying your "encrypted" traffic. Hysolate machines are unaffected. !

    Poništi
  4. 27. pro 2019.

    Ouch. Anyone on the internet can gain access to critical enterprise systems via Citrix servers. No authentication required. Yet another risk of putting critical Windows apps and desktop on VDI.

    Poništi
  5. 13. pro 2019.

    App sandboxing isn't enough to stop persistent adversaries: a 0-day in the Chrome sandbox means that a single visit to the wrong website is enough to breach your laptop, data and identity. It's time to switch to VM-based isolation with .

    Poništi
  6. 11. pro 2019.

    Leveraging Windows "safe mode" is a great way for malware to disable the latest Windows security features... It's impossible to protect an OS like Windows from within Windows. provides security by design, below the OS.

    Poništi
  7. 7. pro 2019.

    The Windows 7 end of life date is quickly approaching, but can Windows 10 really significantly improve security for enterprise workers?

    Poništi
  8. 13. kol 2019.

    Kudos for showing how an innocent user-mode app leverages drivers to own your device. Hysolate devices are protected by design against these threats as everything happens in one of a few VMs. !

    Poništi
  9. 22. srp 2019.

    Have you recently played a video via VLC on your laptop? Your machine might be compromised too. We've built Hysolate so that you wouldn't have to worry about any app vulnerability.

    Poništi
  10. 9. srp 2019.

    Here's another great reason enterprises need comprehensive security on endpoints, security that covers everything that happens on the device, not just sandboxing a few selected apps or detecting known malware.

    Poništi
  11. 3. srp 2019.
    Poništi
  12. 3. srp 2019.

    Amazing fun fact: the average employee has 2.3 devices that they use to complete work!

    Poništi
  13. 8. lip 2019.

    Reason #274 to Hysolate your laptop: because you just won't patch Windows fast enough. Split your laptop into two and stop worrying about Windows vulnerabilities.

    Poništi
  14. 29. svi 2019.
    Poništi
  15. proslijedio/la je Tweet
    15. svi 2019.

    professionals: We’re developing a free assessment tool & want to know what you think is more important. 1: Understanding gaps & vulnerabilities within your VDI infrastructure 2: Identifying gaps within dedicated IT Administrator privileged access workstations

    Poništi
  16. proslijedio/la je Tweet
    1. svi 2019.

    What do and have in common? Read article "Twins Separated at Birth" to find out!

    Poništi
  17. 19. velj 2019.

    Happy to see featured on (we're big fans!). By moving the management/security stack to a trusted layer below the OS, we can get both unprecedented security and solve many EUC pains. Kudos to for covering this (re-)emerging category!

    Poništi
  18. 18. velj 2019.

    A great overview of the history of client hypervisor technologies written by of . Looking forward to part 2: "return of the client hypervisor" 😄 

    Poništi
  19. 23. pro 2018.

    It's great to see take another small step to help advanced users run unsafe EXEs. At Hysolate, we take this approach to a whole new level, letting any user do anything on the device without compromising the enterprise crown jewels. !

    Poništi
  20. 20. ožu 2018.

    Another important step in our journey to transform enterprise endpoints! Proud of our team.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·