Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Web isolation

Latest blogs

Topic : Web isolation
  • --Any--
  • Managed attribution
  • OSINT
  • Intel and evidence
  • Cybersecurity
  • Dark web
  • Web isolation
generia blog

ActiveX Data Leaks: Making Bad (Non-)Browsers Worse

Outdated browser plugins like ActiveX are a perfect target for compromise, yet they still lack regular updates Outdated browsers and…

generia blog

Showdown: VPN vs. Cloud Browser

In many companies, VPN has become a staple of the traditional IT security stack. Annually, mid-sized organizations (<5,000 employees)…

generia blog

85% of Infected Websites Are NOT Blacklisted

Website attacks increased by 59% in 2018, according to the 2019 Website Security Report recently published by Scottsdale, AZ-based…

generia blog

Cloud Browser Economics 101

We could go on all day long about the high price enterprises are paying for using traditional “free” browsers in their day-to-day business…

generia blog

81% of CIOs and CISOs Defer Critical Updates or Patches

New research indicates that eight out of ten CIOs and CISOs refrain from adopting an important security update or patch, due to concerns…

generia blog

FiServ: Minimize Vendor Risk Online in One Quick Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment advisors, and wealth management firms who worry…

generia blog

VPN: A Big Misunderstanding?

Most VPN services fail to provide a level of data protection and anonymity that would pass professional-level muster. Part 3 of our VPN…

generia blog

How Watering Hole Attacks Target the Financial Sector and Governments

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance,…

generia blog

VPN for Secure and Private Web Access? Think Again.

Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? Many…

Blog updates

Stay updated with the latest posts from the blog
Close
Close