Cyberinc
Sticky header logo
Mobile logo
  • PRODUCT
  • USE CASES
  • SUPPORT

Recent Blogs

Recent Blogs Harnessing Zero Trust Security
January 8, 2021in Recent Blogs 0 Comments 2 Likes

Harnessing Zero Trust Security

Zero Trust is the new security jargon floating around the market

by Rajiv Raghunarayan
Recent Blogs The Urgent Need to Fortify the In-Transit Route of the Vaccine
December 17, 2020in Recent Blogs 0 Comments 1 Likes

The Urgent Need to Fortify the In-Transit Route of the Vaccine

As far as the in-transit safety of coronavirus vaccine is concerned, Zero Trust-based RBI can be a game changer.

by Onkar Sharma
Recent Blogs Click Security because “click happens”
December 17, 2020in Recent Blogs 0 Comments 1 Likes

Click Security because “click happens”

Click Security because "click happens"

by Rajiv Raghunarayan
Recent Blogs Breaking Isolation: Is browser isolation sacrilege or a shrewd choice?
October 13, 2020in Recent Blogs 0 Comments 1 Likes

Breaking Isolation: Is browser isolation sacrilege or a shrewd choice?

Is browser isolation sacrilege or a shrewd choice?

by John Klassen
Recent Blogs Are You Prepared for Double Extortion Attacks?
October 6, 2020in Recent Blogs 0 Comments 0 Likes

Are You Prepared for Double Extortion Attacks?

Cybercriminals are exfiltrating data from hacked networks before encrypting it and threatening victims to release it online

by Onkar Sharma
Recent Blogs Isolate Malvertising to Surf the Internet Safely
September 15, 2020in Recent Blogs 0 Comments 8 Likes

Isolate Malvertising to Surf the Internet Safely

Malvertising has triggered the rapid spread of cryptojacking malware in the last few years

by Onkar Sharma
Recent Blogs Cross-Training and Zero Trust to mitigate the need for cybersecurity professionals
September 3, 2020in Recent Blogs 0 Comments 7 Likes

Cross-Training and Zero Trust to mitigate the need for cybersecurity professionals

While addressing the skills gap looks unrealistic in the short term, the adoption of Zero Trust becomes the smart play

by Onkar Sharma
Recent Blogs Can ‘Data Backup’ save your face during a ransomware attack? Think again
September 1, 2020in Recent Blogs 0 Comments 26 Likes

Can ‘Data Backup’ save your face during a ransomware attack? Think again

The University of Utah paid $457K to prevent hackers from leaking the data, even if they had restored the data from backups

by Ashish Nathani
Recent Blogs Remote Browser Isolation for Very Attacked People is the beginning, not an end
August 21, 2020in Recent Blogs 0 Comments 6 Likes

Remote Browser Isolation for Very Attacked People is the beginning, not an end

Companies need to start the RBI journey somewhere and the VAP coverage is a step taken in the right direction

by Onkar Sharma
Recent Blogs Averting a Garmin-like attack: The Remote Browser Isolation way
August 5, 2020in Recent Blogs 0 Comments 5 Likes

Averting a Garmin-like attack: The Remote Browser Isolation way

Avoiding Garmin-like collateral damage caused by a ransomware attack requires you to embrace Zero Trust

by Onkar Sharma
Prev

Posts navigation

  • 1
  • 2
  • 3
Next

Meet Our Bloggers


Rajiv Raghunarayan

Rajiv serves as the Vice President of products at Cyberinc and is responsible for product strategy, product marketing and strategic alliances

Branden Spikes

Branden in a recognized thought leader in IT and cybersecurity and writes about how to prepare today's IT for future challenges

Balaji Desikamani

Bala heads marketing for Cyberinc globally and is responsible for all corporate branding, product branding, field marketing

QUICK LINKS

Isla Isolation Platform
Use Cases
Resources
Privacy Policy

About Us
Partners
Careers
Blogs

News
Events
Support
Contact Us

ABOUT CYBERINC

Cyberinc helps you experience a safer internet by proactively stopping web, email, and document-based threats. Cyberinc’s Isla platform uses cutting-edge isolation technology to neutralize threats and prevent them before they have a chance to act, simplifying the security strategy and delivering immediate protection. Cyberinc is trusted by businesses of all sizes and governments around the world. For more information, please visit www.cyberinc.com.

ABOUT CYBERINC

Cyberinc helps you experience a safer internet by proactively stopping web, email, and document-based threats. Cyberinc’s Isla platform uses cutting-edge isolation technology to neutralize threats and prevent them before they have a chance to act, simplifying the security strategy and delivering immediate protection. Cyberinc is trusted by businesses of all sizes and governments around the world. For more information, please visit www.cyberinc.com.

QUICK LINKS

Isla Isolation Platform
Use Cases
Resources
Privacy Policy

About Us
Partners
Careers
Blogs

News
Events
Support
Contact Us

Copyright Cyberinc All Rights Reserved © 2020
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://blogs.cyberinc.com/wp-content/uploads/2018/06/iStock-533699494.jpg);background-size: cover;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 350px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}