Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Web isolation

Latest blogs

Topic : Web isolation
  • --Any--
  • Cyber threat intelligence
  • Incident response
  • OSINT
  • Managed attribution
  • Dark web
  • Intel and evidence
  • Web isolation
generia blog

Modern CTO interview: Flipping turtles

Things move fast at Authentic8, most of the time. And if they don’t? That’s when leaders shine as enablers and get things back on track.…

SPAs: attack surface-are-us

Web designers love single-page apps (SPAs) because they load quickly and conceal connection deficiencies. They are also the cause of data…

generia blog

"Almost like a virtual safe room"

Are you following Smashing Security, the award-winning podcast with "a helpful and hilarious take on the week's tech SNAFUs" (tag line)?…

generia blog

Authentic8 Silo labeled High Performer on G2

G2 released its Summer 2020 reports, and — based on verified Authentic8 customer reviews — Silo is now considered a High Performer in the…

generia blog

Identity gateways ❤️ web isolation: The perfect marriage for Zero Trust access

In my previous post, I discussed the adoption of Zero Trust/SASE architectures to address the new risks associated with a decentralized…

The billion-dollar security blanket: a feelgood fallacy

Global cybersecurity spending is approaching $200 billion per year, "without actually preventing advanced persistent threats, ransomware,…

generia blog

Remote work: Bad cybersecurity advice galore

Talk is cheap, and web advice is plenty and free on how to secure your IT and digital assets when employees work from home, due to the…

generia blog

Zero trust implementations: Are you still too trusting?

The security industry has been talking about the need for new security architectures for years. Are organizations finally listening?…

generia blog

DOD: Mission execution from home

Authentic8 has announced the immediate availability of enhanced CAC/PIV card capabilities with Zero Trust Application Access for remote…

Blog updates

Stay updated with the latest posts from the blog
Close
Close