Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    5 Ways an Application Sandbox Protects Endpoints, Users & Networks

    By BUFFERZONE Team, 22/03/2016

    For years, banks, airports, government buildings, and other secure facilities have used zone-based physical security (a.k.a. “buffer zones”) to keep assets safe. Yet, what happens when the context shifts from

    Read More >

    Macro Malware Strikes Again – and How You Can Avoid Getting Hit

    By BUFFERZONE Team, 3/02/2016

    In their quest to hack as many victims as possible while expending the least amount of effort, some cyber criminals have decided that instead of creating sophisticated and complex new

    Read More >

    Malware Mania: the More Things Change, the More They Stay the Same

    By BUFFERZONE Team, 26/01/2016

    The startling headlines scream out like something from the front page of a supermarket tabloid: “Terrifying New Malware on the Loose!”, “First-Ever Cyber Menace Spotted in the Wild”, “Cyber Criminals

    Read More >

    Conficker Redux: Is Your Network Security Ready?

    By BUFFERZONE Team, 6/01/2016

    The notorious Conficker worm (a.k.a. Downup, Downadup and Kido) first reared its malicious head in 2008 – which makes it virtually prehistoric.

    Read More >

    FBI to Ransomware Victims: “Pull Out Your Credit Card Instead of Calling the Cyber Cops”

    By BUFFERZONE Team, 3/11/2015

    It’s a Bird…it’s a Plane…it’s a Cost-Benefit Analysis? It’s the equivalent of a superhero telling distraught citizens that they just need to “suck it up” and tolerate some relatively minor

    Read More >

    3 Critical Insights of the Target Breach – and 3 Key Takeaways

    By BUFFERZONE Team, 13/10/2015

    KrebsOnSecurity has obtained an internal report commissioned by Target that investigated the giant retailer’s headline-grabbing data breach in 2013 — and the findings so far are a chilling, cautionary tale

    Read More >