Knowledge Center

WHITE PAPER: The Essential Guide to Web Browser Security
Your ultimate guide to browser security challenges and how to mitigate them to protect your organization from cyber risks.

USE CASE: Financial Services
With ConcealBrowse, financial service organizations can ensure that their online presence is protected, preventing attacks before they gain a foothold on the network.

CASE STUDY: Higher Education
A mid-size community college with approximately 3,000 faculty and staff and 70,000 students was experiencing high susceptibility among its users to phishing attacks, resulting in the execution of malware payloads and loss of credentials. Despite performing security awareness training for years, the college found that users in any group were susceptible to a range of scam techniques, and they operate on a limited budget.

REPORT: Who’s Who In Ransomware: 2023 Report
There are many ways to protect yourself and your organization against ransomware, but for many businesses, it’s not a case of if, but rather when, a cyberattack or breach occurs. The core premise of ransomware remains the same, however the sophistication of today’s attacks is now far more damaging and financially devastating to businesses. This report will provide a window into the organized gangs who plan and execute attacks and their tactics.

INFOGRAPHIC: Empower Employees From Being the Weakest Link
Oftentimes, humans are referred to by organizations as the weakest link to their cybersecurity strategy, but this does not have to be the case! It is your responsibility as an organization to enable your employees to be a part of the cybersecurity mission. Check out our latest infographic to learn how to turn your employees into the strongest link!

USE CASE: Security Red Teams
Cybersecurity Red Teams play the role of attacker/adversary in cybersecurity wargames. They play the bad guys to help sharpen the skills and toolset of the good guys (the Blue Team). Some companies will maintain an in-house Red Team, and some will contract that roll out to consultants. In order to simulate attacks on the friendly target company, the red team has to maintain much of the same attack infrastructure as threat actors.

INFOGRAPHIC: Common Types of Vulnerabilities
In the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.

ConcealBrowse 2023 Solution Brief
In today’s hybrid work-world, employees are spending a larger part of their day in their web browser to access cloud apps, check social media, etc. One study points to 80% of employees spending 80% of their day in their web browser. This reality, coupled with threat actors exploiting messaging platforms within websites and apps, social sites with shortened, and obfuscated links, creates a recipe for increased exposure that is not protected by existing security controls.

WHITE PAPER: The Essential Guide to Web Browser Security
Your ultimate guide to browser security challenges and how to mitigate them to protect your organization from cyber risks.

USE CASE: Financial Services
With ConcealBrowse, financial service organizations can ensure that their online presence is protected, preventing attacks before they gain a foothold on the network.

CASE STUDY: Higher Education
A mid-size community college with approximately 3,000 faculty and staff and 70,000 students was experiencing high susceptibility among its users to phishing attacks, resulting in the execution of malware payloads and loss of credentials. Despite performing security awareness training for years, the college found that users in any group were susceptible to a range of scam techniques, and they operate on a limited budget.

REPORT: Who’s Who In Ransomware: 2023 Report
There are many ways to protect yourself and your organization against ransomware, but for many businesses, it’s not a case of if, but rather when, a cyberattack or breach occurs. The core premise of ransomware remains the same, however the sophistication of today’s attacks is now far more damaging and financially devastating to businesses. This report will provide a window into the organized gangs who plan and execute attacks and their tactics.

INFOGRAPHIC: Empower Employees From Being the Weakest Link
Oftentimes, humans are referred to by organizations as the weakest link to their cybersecurity strategy, but this does not have to be the case! It is your responsibility as an organization to enable your employees to be a part of the cybersecurity mission. Check out our latest infographic to learn how to turn your employees into the strongest link!

USE CASE: Security Red Teams
Cybersecurity Red Teams play the role of attacker/adversary in cybersecurity wargames. They play the bad guys to help sharpen the skills and toolset of the good guys (the Blue Team). Some companies will maintain an in-house Red Team, and some will contract that roll out to consultants. In order to simulate attacks on the friendly target company, the red team has to maintain much of the same attack infrastructure as threat actors.

INFOGRAPHIC: Common Types of Vulnerabilities
In the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.

ConcealBrowse 2023 Solution Brief
In today’s hybrid work-world, employees are spending a larger part of their day in their web browser to access cloud apps, check social media, etc. One study points to 80% of employees spending 80% of their day in their web browser. This reality, coupled with threat actors exploiting messaging platforms within websites and apps, social sites with shortened, and obfuscated links, creates a recipe for increased exposure that is not protected by existing security controls.

WHITE PAPER: The Essential Guide to Web Browser Security
Your ultimate guide to browser security challenges and how to mitigate them to protect your organization from cyber risks.

USE CASE: Financial Services
With ConcealBrowse, financial service organizations can ensure that their online presence is protected, preventing attacks before they gain a foothold on the network.

CASE STUDY: Higher Education
A mid-size community college with approximately 3,000 faculty and staff and 70,000 students was experiencing high susceptibility among its users to phishing attacks, resulting in the execution of malware payloads and loss of credentials. Despite performing security awareness training for years, the college found that users in any group were susceptible to a range of scam techniques, and they operate on a limited budget.

REPORT: Who’s Who In Ransomware: 2023 Report
There are many ways to protect yourself and your organization against ransomware, but for many businesses, it’s not a case of if, but rather when, a cyberattack or breach occurs. The core premise of ransomware remains the same, however the sophistication of today’s attacks is now far more damaging and financially devastating to businesses. This report will provide a window into the organized gangs who plan and execute attacks and their tactics.

INFOGRAPHIC: Empower Employees From Being the Weakest Link
Oftentimes, humans are referred to by organizations as the weakest link to their cybersecurity strategy, but this does not have to be the case! It is your responsibility as an organization to enable your employees to be a part of the cybersecurity mission. Check out our latest infographic to learn how to turn your employees into the strongest link!

USE CASE: Security Red Teams
Cybersecurity Red Teams play the role of attacker/adversary in cybersecurity wargames. They play the bad guys to help sharpen the skills and toolset of the good guys (the Blue Team). Some companies will maintain an in-house Red Team, and some will contract that roll out to consultants. In order to simulate attacks on the friendly target company, the red team has to maintain much of the same attack infrastructure as threat actors.

INFOGRAPHIC: Common Types of Vulnerabilities
In the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.
Do you want to stay in the know?
Subscribe to get updates and new information about Conceal as they become available.