Knowledge Center
Forbes: Beyond The Inbox: The Imperative For Holistic Cybersecurity Approaches
Combat evolving cyber threats! Social engineering, especially via email, poses grave risks. Explore browser security's critical role and a holistic approach for robust cybersecurity.
Enhancing Threat Detection and Prevention through AI
As the tech landscape grapples with the escalating challenges of AI integration and cybersecurity threats, companies like Conceal are at the forefront, leveraging AI as a potent ally against cyber risks.
The Edge Of Browser Security: Why Proxies Aren’t Enough
In today’s hybrid work world, many employees are tethered to their web browsers for both professional and personal purposes. Surprisingly, I've noticed that a large percentage of a worker's day can be spent in this digital gateway. However, the increased web activity presents cyber vulnerabilities that existing security controls, like proxies, fail to address fully. While traditional proxies can filter content and restrict access to certain sites, they fall short of tackling the sophisticated threats in today's dynamic digital landscape. For businesses to truly protect their assets and data, a modern and comprehensive edge security solution is paramount.
Who’s Who In Ransomware
Ransomware is one of the most virulent and difficult security challenges organizations face. Cybersecurity Ventures predicts ransomware will attack a business, consumer, or device every two seconds and will cost victims $265 billion USD annually by 2031.
Five Lessons On Safeguarding Point-Of-Sale Systems
In recent years, cyberattacks on critical infrastructure and organizations, like the one that targeted Suncor Energy, a prominent Canadian energy company, have surged. This incident disrupted Petro-Canada, its subsidiary, causing service interruptions at gas stations nationwide. This attack underscores the vulnerability of point-of-sale systems and emphasizes the urgency for organizations to take proactive measures against cybersecurity threats.
How Managed Service Providers Can Invest in Cybersecurity
The cybersecurity threat landscape is constantly changing with organizations of all sizes struggling to keep pace with increasingly complex and sophisticated cyber threats. Currently, there is a staggering $2 trillion market opportunity between cybersecurity technology and service providers, making it a prime area for managed service providers (MSPs) to explore and seize. Here are some ways that MSPs can tap into this lucrative market.
Maryland’s TikTok Ban Highlights The Need For States To Get Proactive On Cybersecurity: Ex-Governor
Bans that prevent government employees from using China-backed social-media app TikTok have become commonplace, but one of the earliest movers was the State of Maryland — whose former governor, Larry Hogan, last December issued an emergency cybersecurity directive prohibiting a range of Chinese and Russian apps on state government devices.
Cybersecurity 2023: Batten Down The Hatches
In light of the growing and evolving threat of cybercrime, organizations must adopt an agile and proactive approach to their cybersecurity defense strategy. Simply reacting to security incidents is no longer adequate, as tactics like ransomware and credential theft are becoming increasingly sophisticated. CEO Gordon Lawson highlights the importance of implementing more proactive measures to protect users, as relying solely on security awareness may not be sufficient. Taking a proactive and preventative approach is crucial for safeguarding organizations against cyber threats.
How To Optimize Your Cybersecurity Strategy As An MSP
Managed service providers (MSPs) are relied upon by at least 60% of organizations to provide cost-effective outsourced solutions and resolve customer challenges. Cybersecurity is one of the primary challenges faced by MSP clients today, with many vulnerable organizations being targeted by ransomware and other threats. The pandemic-induced shift to remote work and the unprecedented surge in cyberattacks have further intensified the need for MSPs to expand their cybersecurity services. Based on my experience in the cybersecurity industry, here are some tips on how to optimize your strategy and focus in this realm.
How Businesses Can Defend Against Evolving Phishing Attacks
Phishing attacks pose a major threat to both organizations and individuals, and they are continually evolving to become more sophisticated. Despite security professionals' efforts and advancements in security technologies, traditional defenses still fail to protect against these attacks. However, with advanced security controls, such as browser security and awareness training for employees, organizations can minimize their chances of falling victim to attacks in 2023.
Welcome To 2023 – A Year in Which Everyone Is Still Worried About Ransomware
Ransomware - one of the most dangerous attack vectors in cybersecurity - remains a top priority for organizations going into the new year, but why? According to Verizon’s 2022 Data Breach Investigations Report, ransomware attacks increased by 13% from 2020 to 2021. This jump is greater than the past five years combined. Being front and center for years now, shouldn’t ransomware be under control? CEO Gordon Lawson addresses the current failing strategy and highlights the importance of organizations understanding their tech stack and investing in the right tools to avoid ransomware attacks, such as browser security.
The International Approach to Combat Ransomware Requires Private Sector Cooperation
As part of this year's Counter Ransomware Initiative Summit, 13 private sector organizations brought unique perspectives to the forum. It is no surprise that private-sector cooperation was one of the main takeaways. Here is what that cooperation will look like, written by CEO, Gordon Lawson.
How to Prepare for New SEC Cybersecurity Disclosure Requirements
Many organizations used to hit the mute button whenever discussions about cybersecurity came up, but this silence has been breaking more frequently as more businesses are victimized by hackers and experience effects that hit their bottom line in ways that require them to share the information with regulators. Conceal CEO Gordon Lawson shares a few simple steps to help your organization be prepared for the new requirements or can be ready before the next quarterly report.
The Zero Day Dilemma
The statement that corporate cyber security is broken has become a cliché, but it’s all too true. If consumers do not trust global brands to keep their data secure, something’s clearly not working. In fact, the digital world has become a very dangerous place. There are literally millions of viruses floating around out there, but the ones that pose the greatest threat are the zero-day attacks, which involve malware that has never been seen before. Gordon Lawson writes about the problems of zero day attacks and how technology is working to put the security community ahead of bad actors.
What Are The Keys To Combating Dark Web Threats?
One of the leading sources of threats to brand reputation is commonly referred to as the dark web. This cybercrime ecosystem needs to be monitored to keep organizations safe.
Reputational missteps stemming from one of the primary sources in the past—poor judgment and malfeasance—have proven to be extremely costly. CEO Gordon Lawson shares examples of how businesses both can prepare for an attack or discover that some data has already been exfiltrated in his latest Forbes article.
The Future of Cybersecurity is Prevention
While awareness and vigilance are not the biggest worry for organizations today, the real issue we now face is that all security companies are focused on dealing with security after the fact, once indicators of compromise have surfaced. By then, the damage is done. CEO Gordon Lawson writes about how we need to change the way we think about security in his latest Security Week article.
Conceal’s CEO Doubles-Down On Zero Trust Security
CEO Gordon Lawson talks about doubling down on the zero trust concept with a malware protection platform that works at the end of the network and how operating in environments against nation states and cybercriminals has given Conceal a tremendous amount of threat intel to be able to design and deploy that platform.
CISOs Learn How to Zero Trust
For all the talk about nation-state attacks and malicious malware infections, any CISO will tell you one of the biggest issues they face on a daily basis is insider threats — particularly large organizations where sensitive data is plentiful and easy to take. Scott Greaux talks with Hillarie McClure from Cybercrime Magazine about how enterprise security architects go from a broad, overriding philosophy to a workable, effective protection against insider and other threats.
Why Isolation is a New Weapon in the Battle Against Cyber Crime
If malware gets into a computer, it’s too late. And since the vast majority of malware uses the browser as a way to deploy its malicious payload, this is the logical place to set up roadblocks and determine when isolation is required. Conceal CSO, Dustin Webber explains why it's important to err on the side of caution and adopt the deny-by-default policy.
Is an Infrastructure War on the Horizon?
We have seen a paradigm shift in the role the Federal government is expected to play in cyber security. Until recently, it was assumed that companies (along with educational institutions and state and local governments) were responsible for their own cybersecurity. Now, it’s clear that cyber crime doesn’t merely threaten individuals or individual companies – it threatens the common infrastructure that we all depend on. Conceal CEO, Gordon Lawson explains why companies and public works organizations that comprise our infrastructure need to be more diligent than ever in managing vulnerabilities and defending their endpoints.
How Zero Trust Can Protect Your Company from the Inside Out
Designing and building a zero-trust framework begins with a critical acknowledgment: The perimeter is dead. Today’s highly interconnected world—linked by clouds, containers, APIs and more—means that there’s no way to place a guard at the palace entrance to stop intruders from entering. Zero Trust requires a completely different mindset, and it extends beyond vendors and technology. Gordon Lawson CEO explains how Zero Trust can protect your business, along with best practices advice for implementing a Zero Trust framework
Cyberwarfare Landscape Changes: How To Play Defense
Over the past five years or so, we’ve observed lines blur when it comes to warfare. Combat is no longer always on the physical battlefield; instead, wars can now be fought from bedrooms or coffee shops. In an interview with Cybersecurity Ventures, Miller, together with Gordon Lawson, chief executive officer of Conceal, explained how the warfare landscape is changing and why there is a gradual shift to the defensive side of the coin.
ConcealBrowse isolates malicious software before it can work its mischief
More threat actors are exploiting the browser as an attack vector, largely because it’s becoming a popular way to access corporate applications and resources. As a means to counter browser-borne malicious software, such as Trojans, worms or ransomware, ConcealBrowse can be planted on an endpoint by a network administrator where it will monitor all code as it runs to determine if it presents a threat to an organization.
Forbes: How To Combat AI-Powered Phishing In An Increasingly Ambiguous Cyber Landscape
The rise of artificial intelligence (AI) technologies has transformed the business world, enhancing efficiency and enabling groundbreaking innovations. However, this progress comes with an increasing slate of cybersecurity challenges, particularly in phishing attacks.
Forbes: Beyond The Inbox: The Imperative For Holistic Cybersecurity Approaches
Combat evolving cyber threats! Social engineering, especially via email, poses grave risks. Explore browser security's critical role and a holistic approach for robust cybersecurity.
Enhancing Threat Detection and Prevention through AI
As the tech landscape grapples with the escalating challenges of AI integration and cybersecurity threats, companies like Conceal are at the forefront, leveraging AI as a potent ally against cyber risks.
The Edge Of Browser Security: Why Proxies Aren’t Enough
In today’s hybrid work world, many employees are tethered to their web browsers for both professional and personal purposes. Surprisingly, I've noticed that a large percentage of a worker's day can be spent in this digital gateway. However, the increased web activity presents cyber vulnerabilities that existing security controls, like proxies, fail to address fully. While traditional proxies can filter content and restrict access to certain sites, they fall short of tackling the sophisticated threats in today's dynamic digital landscape. For businesses to truly protect their assets and data, a modern and comprehensive edge security solution is paramount.
Who’s Who In Ransomware
Ransomware is one of the most virulent and difficult security challenges organizations face. Cybersecurity Ventures predicts ransomware will attack a business, consumer, or device every two seconds and will cost victims $265 billion USD annually by 2031.
Five Lessons On Safeguarding Point-Of-Sale Systems
In recent years, cyberattacks on critical infrastructure and organizations, like the one that targeted Suncor Energy, a prominent Canadian energy company, have surged. This incident disrupted Petro-Canada, its subsidiary, causing service interruptions at gas stations nationwide. This attack underscores the vulnerability of point-of-sale systems and emphasizes the urgency for organizations to take proactive measures against cybersecurity threats.
How Managed Service Providers Can Invest in Cybersecurity
The cybersecurity threat landscape is constantly changing with organizations of all sizes struggling to keep pace with increasingly complex and sophisticated cyber threats. Currently, there is a staggering $2 trillion market opportunity between cybersecurity technology and service providers, making it a prime area for managed service providers (MSPs) to explore and seize. Here are some ways that MSPs can tap into this lucrative market.
Maryland’s TikTok Ban Highlights The Need For States To Get Proactive On Cybersecurity: Ex-Governor
Bans that prevent government employees from using China-backed social-media app TikTok have become commonplace, but one of the earliest movers was the State of Maryland — whose former governor, Larry Hogan, last December issued an emergency cybersecurity directive prohibiting a range of Chinese and Russian apps on state government devices.
Cybersecurity 2023: Batten Down The Hatches
In light of the growing and evolving threat of cybercrime, organizations must adopt an agile and proactive approach to their cybersecurity defense strategy. Simply reacting to security incidents is no longer adequate, as tactics like ransomware and credential theft are becoming increasingly sophisticated. CEO Gordon Lawson highlights the importance of implementing more proactive measures to protect users, as relying solely on security awareness may not be sufficient. Taking a proactive and preventative approach is crucial for safeguarding organizations against cyber threats.
How To Optimize Your Cybersecurity Strategy As An MSP
Managed service providers (MSPs) are relied upon by at least 60% of organizations to provide cost-effective outsourced solutions and resolve customer challenges. Cybersecurity is one of the primary challenges faced by MSP clients today, with many vulnerable organizations being targeted by ransomware and other threats. The pandemic-induced shift to remote work and the unprecedented surge in cyberattacks have further intensified the need for MSPs to expand their cybersecurity services. Based on my experience in the cybersecurity industry, here are some tips on how to optimize your strategy and focus in this realm.
How Businesses Can Defend Against Evolving Phishing Attacks
Phishing attacks pose a major threat to both organizations and individuals, and they are continually evolving to become more sophisticated. Despite security professionals' efforts and advancements in security technologies, traditional defenses still fail to protect against these attacks. However, with advanced security controls, such as browser security and awareness training for employees, organizations can minimize their chances of falling victim to attacks in 2023.
Welcome To 2023 – A Year in Which Everyone Is Still Worried About Ransomware
Ransomware - one of the most dangerous attack vectors in cybersecurity - remains a top priority for organizations going into the new year, but why? According to Verizon’s 2022 Data Breach Investigations Report, ransomware attacks increased by 13% from 2020 to 2021. This jump is greater than the past five years combined. Being front and center for years now, shouldn’t ransomware be under control? CEO Gordon Lawson addresses the current failing strategy and highlights the importance of organizations understanding their tech stack and investing in the right tools to avoid ransomware attacks, such as browser security.
The International Approach to Combat Ransomware Requires Private Sector Cooperation
As part of this year's Counter Ransomware Initiative Summit, 13 private sector organizations brought unique perspectives to the forum. It is no surprise that private-sector cooperation was one of the main takeaways. Here is what that cooperation will look like, written by CEO, Gordon Lawson.
How to Prepare for New SEC Cybersecurity Disclosure Requirements
Many organizations used to hit the mute button whenever discussions about cybersecurity came up, but this silence has been breaking more frequently as more businesses are victimized by hackers and experience effects that hit their bottom line in ways that require them to share the information with regulators. Conceal CEO Gordon Lawson shares a few simple steps to help your organization be prepared for the new requirements or can be ready before the next quarterly report.
The Zero Day Dilemma
The statement that corporate cyber security is broken has become a cliché, but it’s all too true. If consumers do not trust global brands to keep their data secure, something’s clearly not working. In fact, the digital world has become a very dangerous place. There are literally millions of viruses floating around out there, but the ones that pose the greatest threat are the zero-day attacks, which involve malware that has never been seen before. Gordon Lawson writes about the problems of zero day attacks and how technology is working to put the security community ahead of bad actors.
What Are The Keys To Combating Dark Web Threats?
One of the leading sources of threats to brand reputation is commonly referred to as the dark web. This cybercrime ecosystem needs to be monitored to keep organizations safe.
Reputational missteps stemming from one of the primary sources in the past—poor judgment and malfeasance—have proven to be extremely costly. CEO Gordon Lawson shares examples of how businesses both can prepare for an attack or discover that some data has already been exfiltrated in his latest Forbes article.
The Future of Cybersecurity is Prevention
While awareness and vigilance are not the biggest worry for organizations today, the real issue we now face is that all security companies are focused on dealing with security after the fact, once indicators of compromise have surfaced. By then, the damage is done. CEO Gordon Lawson writes about how we need to change the way we think about security in his latest Security Week article.
Conceal’s CEO Doubles-Down On Zero Trust Security
CEO Gordon Lawson talks about doubling down on the zero trust concept with a malware protection platform that works at the end of the network and how operating in environments against nation states and cybercriminals has given Conceal a tremendous amount of threat intel to be able to design and deploy that platform.
CISOs Learn How to Zero Trust
For all the talk about nation-state attacks and malicious malware infections, any CISO will tell you one of the biggest issues they face on a daily basis is insider threats — particularly large organizations where sensitive data is plentiful and easy to take. Scott Greaux talks with Hillarie McClure from Cybercrime Magazine about how enterprise security architects go from a broad, overriding philosophy to a workable, effective protection against insider and other threats.
Why Isolation is a New Weapon in the Battle Against Cyber Crime
If malware gets into a computer, it’s too late. And since the vast majority of malware uses the browser as a way to deploy its malicious payload, this is the logical place to set up roadblocks and determine when isolation is required. Conceal CSO, Dustin Webber explains why it's important to err on the side of caution and adopt the deny-by-default policy.
Is an Infrastructure War on the Horizon?
We have seen a paradigm shift in the role the Federal government is expected to play in cyber security. Until recently, it was assumed that companies (along with educational institutions and state and local governments) were responsible for their own cybersecurity. Now, it’s clear that cyber crime doesn’t merely threaten individuals or individual companies – it threatens the common infrastructure that we all depend on. Conceal CEO, Gordon Lawson explains why companies and public works organizations that comprise our infrastructure need to be more diligent than ever in managing vulnerabilities and defending their endpoints.
How Zero Trust Can Protect Your Company from the Inside Out
Designing and building a zero-trust framework begins with a critical acknowledgment: The perimeter is dead. Today’s highly interconnected world—linked by clouds, containers, APIs and more—means that there’s no way to place a guard at the palace entrance to stop intruders from entering. Zero Trust requires a completely different mindset, and it extends beyond vendors and technology. Gordon Lawson CEO explains how Zero Trust can protect your business, along with best practices advice for implementing a Zero Trust framework
Cyberwarfare Landscape Changes: How To Play Defense
Over the past five years or so, we’ve observed lines blur when it comes to warfare. Combat is no longer always on the physical battlefield; instead, wars can now be fought from bedrooms or coffee shops. In an interview with Cybersecurity Ventures, Miller, together with Gordon Lawson, chief executive officer of Conceal, explained how the warfare landscape is changing and why there is a gradual shift to the defensive side of the coin.
ConcealBrowse isolates malicious software before it can work its mischief
More threat actors are exploiting the browser as an attack vector, largely because it’s becoming a popular way to access corporate applications and resources. As a means to counter browser-borne malicious software, such as Trojans, worms or ransomware, ConcealBrowse can be planted on an endpoint by a network administrator where it will monitor all code as it runs to determine if it presents a threat to an organization.
Forbes: How To Combat AI-Powered Phishing In An Increasingly Ambiguous Cyber Landscape
The rise of artificial intelligence (AI) technologies has transformed the business world, enhancing efficiency and enabling groundbreaking innovations. However, this progress comes with an increasing slate of cybersecurity challenges, particularly in phishing attacks.
Forbes: Beyond The Inbox: The Imperative For Holistic Cybersecurity Approaches
Combat evolving cyber threats! Social engineering, especially via email, poses grave risks. Explore browser security's critical role and a holistic approach for robust cybersecurity.
Enhancing Threat Detection and Prevention through AI
As the tech landscape grapples with the escalating challenges of AI integration and cybersecurity threats, companies like Conceal are at the forefront, leveraging AI as a potent ally against cyber risks.
The Edge Of Browser Security: Why Proxies Aren’t Enough
In today’s hybrid work world, many employees are tethered to their web browsers for both professional and personal purposes. Surprisingly, I've noticed that a large percentage of a worker's day can be spent in this digital gateway. However, the increased web activity presents cyber vulnerabilities that existing security controls, like proxies, fail to address fully. While traditional proxies can filter content and restrict access to certain sites, they fall short of tackling the sophisticated threats in today's dynamic digital landscape. For businesses to truly protect their assets and data, a modern and comprehensive edge security solution is paramount.
Who’s Who In Ransomware
Ransomware is one of the most virulent and difficult security challenges organizations face. Cybersecurity Ventures predicts ransomware will attack a business, consumer, or device every two seconds and will cost victims $265 billion USD annually by 2031.
Five Lessons On Safeguarding Point-Of-Sale Systems
In recent years, cyberattacks on critical infrastructure and organizations, like the one that targeted Suncor Energy, a prominent Canadian energy company, have surged. This incident disrupted Petro-Canada, its subsidiary, causing service interruptions at gas stations nationwide. This attack underscores the vulnerability of point-of-sale systems and emphasizes the urgency for organizations to take proactive measures against cybersecurity threats.
How Managed Service Providers Can Invest in Cybersecurity
The cybersecurity threat landscape is constantly changing with organizations of all sizes struggling to keep pace with increasingly complex and sophisticated cyber threats. Currently, there is a staggering $2 trillion market opportunity between cybersecurity technology and service providers, making it a prime area for managed service providers (MSPs) to explore and seize. Here are some ways that MSPs can tap into this lucrative market.
Maryland’s TikTok Ban Highlights The Need For States To Get Proactive On Cybersecurity: Ex-Governor
Bans that prevent government employees from using China-backed social-media app TikTok have become commonplace, but one of the earliest movers was the State of Maryland — whose former governor, Larry Hogan, last December issued an emergency cybersecurity directive prohibiting a range of Chinese and Russian apps on state government devices.
Cybersecurity 2023: Batten Down The Hatches
In light of the growing and evolving threat of cybercrime, organizations must adopt an agile and proactive approach to their cybersecurity defense strategy. Simply reacting to security incidents is no longer adequate, as tactics like ransomware and credential theft are becoming increasingly sophisticated. CEO Gordon Lawson highlights the importance of implementing more proactive measures to protect users, as relying solely on security awareness may not be sufficient. Taking a proactive and preventative approach is crucial for safeguarding organizations against cyber threats.
How To Optimize Your Cybersecurity Strategy As An MSP
Managed service providers (MSPs) are relied upon by at least 60% of organizations to provide cost-effective outsourced solutions and resolve customer challenges. Cybersecurity is one of the primary challenges faced by MSP clients today, with many vulnerable organizations being targeted by ransomware and other threats. The pandemic-induced shift to remote work and the unprecedented surge in cyberattacks have further intensified the need for MSPs to expand their cybersecurity services. Based on my experience in the cybersecurity industry, here are some tips on how to optimize your strategy and focus in this realm.
How Businesses Can Defend Against Evolving Phishing Attacks
Phishing attacks pose a major threat to both organizations and individuals, and they are continually evolving to become more sophisticated. Despite security professionals' efforts and advancements in security technologies, traditional defenses still fail to protect against these attacks. However, with advanced security controls, such as browser security and awareness training for employees, organizations can minimize their chances of falling victim to attacks in 2023.
Welcome To 2023 – A Year in Which Everyone Is Still Worried About Ransomware
Ransomware - one of the most dangerous attack vectors in cybersecurity - remains a top priority for organizations going into the new year, but why? According to Verizon’s 2022 Data Breach Investigations Report, ransomware attacks increased by 13% from 2020 to 2021. This jump is greater than the past five years combined. Being front and center for years now, shouldn’t ransomware be under control? CEO Gordon Lawson addresses the current failing strategy and highlights the importance of organizations understanding their tech stack and investing in the right tools to avoid ransomware attacks, such as browser security.
The International Approach to Combat Ransomware Requires Private Sector Cooperation
As part of this year's Counter Ransomware Initiative Summit, 13 private sector organizations brought unique perspectives to the forum. It is no surprise that private-sector cooperation was one of the main takeaways. Here is what that cooperation will look like, written by CEO, Gordon Lawson.
How to Prepare for New SEC Cybersecurity Disclosure Requirements
Many organizations used to hit the mute button whenever discussions about cybersecurity came up, but this silence has been breaking more frequently as more businesses are victimized by hackers and experience effects that hit their bottom line in ways that require them to share the information with regulators. Conceal CEO Gordon Lawson shares a few simple steps to help your organization be prepared for the new requirements or can be ready before the next quarterly report.
The Zero Day Dilemma
The statement that corporate cyber security is broken has become a cliché, but it’s all too true. If consumers do not trust global brands to keep their data secure, something’s clearly not working. In fact, the digital world has become a very dangerous place. There are literally millions of viruses floating around out there, but the ones that pose the greatest threat are the zero-day attacks, which involve malware that has never been seen before. Gordon Lawson writes about the problems of zero day attacks and how technology is working to put the security community ahead of bad actors.
What Are The Keys To Combating Dark Web Threats?
One of the leading sources of threats to brand reputation is commonly referred to as the dark web. This cybercrime ecosystem needs to be monitored to keep organizations safe.
Reputational missteps stemming from one of the primary sources in the past—poor judgment and malfeasance—have proven to be extremely costly. CEO Gordon Lawson shares examples of how businesses both can prepare for an attack or discover that some data has already been exfiltrated in his latest Forbes article.
The Future of Cybersecurity is Prevention
While awareness and vigilance are not the biggest worry for organizations today, the real issue we now face is that all security companies are focused on dealing with security after the fact, once indicators of compromise have surfaced. By then, the damage is done. CEO Gordon Lawson writes about how we need to change the way we think about security in his latest Security Week article.
Conceal’s CEO Doubles-Down On Zero Trust Security
CEO Gordon Lawson talks about doubling down on the zero trust concept with a malware protection platform that works at the end of the network and how operating in environments against nation states and cybercriminals has given Conceal a tremendous amount of threat intel to be able to design and deploy that platform.
CISOs Learn How to Zero Trust
For all the talk about nation-state attacks and malicious malware infections, any CISO will tell you one of the biggest issues they face on a daily basis is insider threats — particularly large organizations where sensitive data is plentiful and easy to take. Scott Greaux talks with Hillarie McClure from Cybercrime Magazine about how enterprise security architects go from a broad, overriding philosophy to a workable, effective protection against insider and other threats.
Why Isolation is a New Weapon in the Battle Against Cyber Crime
If malware gets into a computer, it’s too late. And since the vast majority of malware uses the browser as a way to deploy its malicious payload, this is the logical place to set up roadblocks and determine when isolation is required. Conceal CSO, Dustin Webber explains why it's important to err on the side of caution and adopt the deny-by-default policy.
Is an Infrastructure War on the Horizon?
We have seen a paradigm shift in the role the Federal government is expected to play in cyber security. Until recently, it was assumed that companies (along with educational institutions and state and local governments) were responsible for their own cybersecurity. Now, it’s clear that cyber crime doesn’t merely threaten individuals or individual companies – it threatens the common infrastructure that we all depend on. Conceal CEO, Gordon Lawson explains why companies and public works organizations that comprise our infrastructure need to be more diligent than ever in managing vulnerabilities and defending their endpoints.
How Zero Trust Can Protect Your Company from the Inside Out
Designing and building a zero-trust framework begins with a critical acknowledgment: The perimeter is dead. Today’s highly interconnected world—linked by clouds, containers, APIs and more—means that there’s no way to place a guard at the palace entrance to stop intruders from entering. Zero Trust requires a completely different mindset, and it extends beyond vendors and technology. Gordon Lawson CEO explains how Zero Trust can protect your business, along with best practices advice for implementing a Zero Trust framework
Cyberwarfare Landscape Changes: How To Play Defense
Over the past five years or so, we’ve observed lines blur when it comes to warfare. Combat is no longer always on the physical battlefield; instead, wars can now be fought from bedrooms or coffee shops. In an interview with Cybersecurity Ventures, Miller, together with Gordon Lawson, chief executive officer of Conceal, explained how the warfare landscape is changing and why there is a gradual shift to the defensive side of the coin.
ConcealBrowse isolates malicious software before it can work its mischief
More threat actors are exploiting the browser as an attack vector, largely because it’s becoming a popular way to access corporate applications and resources. As a means to counter browser-borne malicious software, such as Trojans, worms or ransomware, ConcealBrowse can be planted on an endpoint by a network administrator where it will monitor all code as it runs to determine if it presents a threat to an organization.
Do you want to stay in the know?
Subscribe to get updates and new information about Conceal as they become available.