What You Should Know About Browser and Endpoint Isolation
By BUFFERZONE Team, 24/05/2023
Web security is of paramount importance in today’s digital landscape. Browsers enable access to various types of online resources like websites, digital media, and cloud-based services. However, this also makes
Read More >Safe Workspace®Empowering Enterprise Browser
By BUFFERZONE Team, 23/05/2023
The rise of cloud services and digital transformation has changed the traditional approach to network and endpoint security. The ability to communicate quickly, access SaaS applications, and work from home
Read More >ISO 27001 (2013) and How BUFFERZONE Customers Benefits from It
By BUFFERZONE Team, 4/05/2023
Target tag: Product Tags: Certification, ISO, Phisical Seccurity, Cloud Security ISO 27001 (2013) is an international standard that outlines the requirements for an information security management system (ISMS). It provides
Read More >What Is Content Disarm and Reconstruction?
By BUFFERZONE Team, 4/05/2023
Tags: Malware Analysis, CDR, Zero-Trust, Detection Audience Tag: Feature Spotlight Over 92% of cyber-attacks start with seemingly harmless emails or links? According to a report [1], the number of malicious
Read More >Sophisticated Phishing Attacks Alert – How BUFFERZONE Can Stop It
By BUFFERZONE Team, 23/04/2023
Microsoft has issued a warning regarding a new phishing campaign aimed at accounting firms and tax preparers, which involves the use of remote access malware to gain unauthorized entry into
Read More >MITRE ATT&CK® mapping and how it contributes to the users
By BUFFERZONE Team, 15/03/2023
The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) is a comprehensive knowledge base and model for cyber adversary behavior. It reflects the various phases and steps an adversary may
Read More >