Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Cybersecurity

Latest blogs

Topic : Cybersecurity
  • --Any--
  • Managed attribution
  • OSINT
  • Intel and evidence
  • Cybersecurity
  • Dark web
  • Web isolation
generia blog

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails…

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

generia blog

Cybersecurity executive order aims to uplevel protections across agencies

The Executive Order on Improving the Nation’s Cybersecurity takes aim at improving information sharing, supply chain security and tackling…

generia blog

Authentic8 and LifeRaft: Simplifying workflow to get to ground truth faster

Integration between our Silo Web Isolation Platform and LifeRaft’s security intelligence solution, Navigator, provides the efficiency,…

generia blog

New Silo-Splunk integration for SOCs automates log correlation

New Silo for Safe Access feature provides Splunk integration for SOCs to monitor employee web and SaaS app access on any device, managed or…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

generia blog

Protecting against election interference in 2024

Despite near constant news around accusations of election interference, the 2020 general election has been called “the most secure in…

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

Blog updates

Stay updated with the latest posts from the blog
Close
Close