Gartner top 10 list of 2016 information security technologies

June, 16, 2016   Branden Spikes

Kudos to Gartner for a great top 10 list of 2016 information security technologies that includes the emerging new tech known as "Remote Browser." It is a new concept for many, founded on the principal understanding that web browsers are not trustworthy applications. Those who wish to keep secure should not allow ...

Read more

Pwn2Own 2016 - The Results are In: Browsers Are Still Not Secure

March, 18, 2016     Franklyn Jones

The annual Pwn2Own hacking event, held each year at CanSecWest in Vancouver, is the very definition of geek fun. Imagine white hat teams from all over the world coming ...

Read more

SSL Everywhere

February, 22, 2016     Branden Spikes

I’m often asked how Isla protects users from phishing, and have to admit I have never liked my answer. Phishing is a grifter’s game, a trick, and a ...

Read more

A perspective on Apple's iPhone security battle

February, 19, 2016     Branden Spikes

There has been a lot of talk about whether the Justice Department of the US Government can ask Apple to comply with an FBI order to allow access to an ...

Read more

Here’s When It’s Not Good to Be a Member of the 1%

February, 17, 2016     Franklyn Jones

In case you missed it, Panda Security recently released a great report that summarizes the continued growth of malware and cyber attacks that the company tracked and recorded globally in 2015. ...

Read more

The Jaw-Dropping Financial Impact of Cyber Threats

December, 07, 2015     Franklyn Jones

If you're a CISO, CFO, or CIO, you better sit down for this. According to recent research published by Markets and Markets, you and your peers in organizations worldwide are ...

Read more

The Great Debate: What Should We Do About the Flash Problem?

September, 21, 2015     Franklyn Jones

Since presidential candidate debates are all the rage these days, it might be cool to ask all the candidates another politically charged question: "What is your policy regarding the use ...

Read more

LogJam bug exposes encrypted browser data

May, 21, 2015     Branden Spikes

A new flaw in encrypted browser traffic dubbed "LogJam" has been revealed which, like BREACH and FREAK before it, exposes encrypted data to man-in-the-middle snooping. This is a great opportunity ...

Read more

Proud to Be a Cool Vendor!

May, 12, 2015     Branden Spikes

Today, we are pleased to announce that Spikes Security has been named a Gartner 2015 Cool Vendor in Security Infrastructure Protection. Being recognized as a Cool Vendor is an important accomplishment ...

Read more

Rombertik - When Detection Leads to Destruction

May, 05, 2015     Franklyn Jones

An interesting article just published in Security Week highlights some great new investigative work by the Cisco security team. It has to do with Rombertik, an impressive piece of malware ...

Read more

How One Guy Hacked Google Chrome in Two Minutes

March, 24, 2015     Franklyn Jones

The annual Pwn2Own hacking event, sponsored each year by HP, took place again last week at the CanSecWest 2015 in Vancouver. As usual, all major browsers- including Chrome, Internet Explorer, ...

Read more

Prevent malware with your network, not your endpoint.

March, 13, 2015     Branden Spikes

Isolation technology is on the rise, thanks to the mother of all invention. Necessity. Security experts are grasping for ways to protect their networks from the endless barrage of browser ...

Read more

New Security Report: It's All About Pain, Desperation, and Resistance

February, 02, 2015     Franklyn Jones

I'm pleased to announce that, in cooperation with the Ponemon Institute, we have just published a new research report that I think you'll find very interesting. The focus of the ...

Read more

Five Cyber Security Predictions for 2015

January, 26, 2015     Branden Spikes

The browser is already the undisputed champion of enterprise applications, becoming clearly the most ubiquitous and strategically important application run by employees in the workplace. However, we have only begun ...

Read more

Security Appliance Tests - What We're Learning About Threat Prevention

January, 14, 2015     Franklyn Jones

In my last blog, I highlighted some interesting research in a new report published by Delta Testing in the UK. In case you missed that, they tested several different, well-known ...

Read more

Tis The Season To Be Hacked

December, 05, 2014     Franklyn Jones

I know this is supposed to be a happy time of year where the focus shifts to family, friends, and the holidays. But I have some bad news – and then ...

Read more

Influenza, Malware, and the $10B Price Tag We All Pay

November, 11, 2014     Franklyn Jones

Yup, flu season is just around the corner. And before you know it, we'll all be complaining about headaches, fevers, runny noses, blah, blah, blah. It's the same story every ...

Read more

The Big Leagues

October, 22, 2014     Branden Spikes

Today we brighten everyone's future, and perhaps ours here at Spikes Security a little extra, as we become better able to protect the glorious potential of the Internet. Our promising, ...

Read more

A Banking Cyber Attack Using 500,000 PCs?

October, 10, 2014     Franklyn Jones

Did you hear about this - a botnet of nearly half-a-million PCs, all carefully infected and focused on attacking banking web sites across the US and Europe. It's true, and ...

Read more

New Report: Is IT Losing Confidence In Its Security Architecture?

September, 11, 2014     Franklyn Jones

More than half of IT organizations admit they aren't sure if their networks have already been breached by an advanced malware attack. If a breach did happen, nearly 50% are not ...

Read more

How to Create a Malware Market - And How to Stop It

August, 12, 2014     Franklyn Jones

There was a great article published this week on CSO Online that described the evolution of a black market for malware kits. The article was written almost like a case ...

Read more

Why AirGap is More Secure Than an Air-Gapped Architecture

August, 01, 2014     Franklyn Jones

Anyone involved in securing corporate networks would agree that we are continually facing a clear and present danger of advanced malware attacks capable of penetrating defenses, infecting endpoint devices, and ...

Read more

Banks and Bullseyes

July, 23, 2014     Franklyn Jones

It's probably not good to be a bank right now. Actually, it's probably not good to have money in a bank right now either. A couple of recent news items ...

Read more

Gartner Agrees - It's Time for Isolation!

June, 27, 2014     Franklyn Jones

If you've been following Spikes Security, you already know that our AirGap web security solution uses an innovative isolation technology to prevent all cyber attacks delivered through web browsers. It's ...

Read more

The Secret Lie of Web Security

June, 03, 2014     Franklyn Jones

There are so many news stories about new cyber attacks, week after week, that it doesn't take long before your eyes start to glaze over when another comes along. So, ...

Read more

Groundhog Day – Ten Years and Counting

May, 28, 2014     Franklyn Jones

You remember the movie. Bill Murray gets caught in an endless time loop where he relives the same day over and over and over again. Despite his daily efforts to ...

Read more

A New FireEye Report and Albert Einstein's Perspective

May, 21, 2014     Franklyn Jones

A New FireEye Report and Albert Einstein's Perspective FireEye just published another good report on what is REALLY happening in corporate networks today. It's based on network data captured by ...

Read more

InfoSecurity UK

May, 12, 2014     Branden Spikes

We're excited to report that Spikes Security made a very strong debut in the UK market with an exhibition at the recent Infosecurity Conference held in London.  If you're not ...

Read more

ZDNet, "If the browser is the new client, is Spikes AirGap the new security?"

February, 06, 2014     Jonathan

In a recent article on ZDNet, Dan Kusnetzky asks "If the browser is the new client, is Spikes AirGap the new security?" Kusnetzky is a member of the Kusnetzky Group, ...

Read more

Cyber Monday Security Checklist

December, 02, 2013     Branden Spikes

Read more

What ObamaCare could mean for your web browser

November, 12, 2013     Jonathan

Fake websites designed to steal your identity or empty your bank accounts are nothing new. However, the uncertainty surrounding new programs that fall under the umbrella of the Affordable Care ...

Read more

Tim Beyers from The Motley Fool shares his thoughts on Spikes AirGap

October, 28, 2013     Jonathan

This week Spikes appeared on The Motley Fool in an article by Tim Beyers. In this youtube video Beyers speculates "I'm wondering if Chrome, and Google in general have a ...

Read more

Official Launch of AirGap and the Mac Client!

October, 07, 2013     Branden Spikes

Spikes has officially launched AirGap Enterprise for the SMB space! AirGap formerly known as the Spikes Browser, is based on AirGapped technology, where the browser is physically separated from the ...

Read more

IP Theft for Military Gain

October, 04, 2013     Branden Spikes

Read more

The reality of malicious code and virtualization solutions

October, 03, 2013     Scott Martin

Even with my experience in the IT/InfoSec industry, I'm frequently amazed by the new and innovative lengths people go to with existing, old tools to try to protect their ...

Read more

Spikes AirGap Browser Featured in TechCrunch

August, 27, 2013     Branden Spikes

We're happy to say that the Spikes Airgap browser was recently  featured in TechCrunch by renowned analyst Frederic Lardinois! Frederic delves into the details about how the Airgap ...

Read more

Black Hat 2013 was a success!

August, 08, 2013     Branden Spikes

A great time was had by all!  It was both exciting and reassuring for the Spikes team to see innovative advancements in cybersecurity at Blackhat 2013.   From advanced firewalls ...

Read more

Spikes will be at Black Hat 2013!

July, 22, 2013     Branden Spikes

The Spikes team will be at Black Hat USA 2013 next week in Las Vegas, showing off our new Spikes Browser. CEO Branden Spikes will hold a workshop outlining the fundamental ...

Read more

Closing the Front Door on Cyberattacks

July, 02, 2013     Branden Spikes

The National Institute of Standards and Technology (NIST) will be holding their 3rd Cybersecurity Framework Workshop from July 10-12 in San Diego, California to discuss Executive Order 13636, which deals with "...

Read more

Hackers are doing our marketing for us!

May, 02, 2013     Branden Spikes

Tuesday evening the US Department of Labor's website got hacked, and served up malware!  People often get a false sense of security and think "I won't get hacked if ...

Read more

Have a LivingSocial account? Time to change your password!

April, 29, 2013     Branden Spikes

In a recent cyber-heist, 50 million encrypted passwords were stolen from LivingSocial last week.  Since it takes a week or two to hack stolen encrypted passwords you can bet ...

Read more

Actionable intelligence

March, 31, 2013     Branden Spikes

There's some really good actionable intelligence in this report from Palo Alto Networks.  I'm really pleased with the effort, and authoring of the content too, these guys really get ...

Read more

NATO says cybercrime against civilian targets could justify a "Conventional Response" from government.

March, 20, 2013     Branden Spikes

Hackers, don't hack hospitals or power grids.  If you cause any loss of life or significant property damage it could be considered an act which justifies military or "conventional ...

Read more

Big Problem - No Solutions?

February, 05, 2013     John Rees

February 5, 2013 It is astonishing that after 10 years of cyber criminals breaching corporate, government and personal data:  we are just now being inundated with news of cyber crime and are ...

Read more

NYTimes hacked by China, handles it properly.

February, 03, 2013     Branden Spikes

I think it's pretty cool that NYTimes discovered hackers and then proceeded to hire a security firm to surreptitiously track the intruders.  I think many people would have ...

Read more

Great article on debunking false sense of security.

January, 18, 2013     Branden Spikes

Roger Grimes wrote a great article over at InfoWorld about the popular IT security practices which "just don't work."  This echoes the preaching I find myself doing on ...

Read more

Latest Spikes Newsletter

January, 18, 2013     Branden Spikes

Check out our latest newsletter over at Mailchimp, boom! Europe's security authority, the ENISA came forward this week with the news that this threat is growing ...

Read more

The top security threat of 2013: the web browser.

January, 11, 2013     Branden Spikes

Something I've been preaching for a couple years, but is finally getting some well-deserved recognition among security authorities is that drive-by malware from web links is the #1 threat facing ...

Read more

Cybercrime going mobile...

January, 03, 2013     John Rees

Mobile devices and Social Media platforms are becoming hacker focus points. Cybercriminals are constantly changing their tactics to target both these fast-growing platforms where consumers are less aware of security ...

Read more

45% Of All Browsers Unpatched

January, 03, 2013     John Rees

According to a recent study, approximately 45% of people surfing the Internet were not utilizing the most secure version of their web browser.  Like other software, without the appropriate security ...

Read more

Another one bites the dust.

November, 24, 2012     Branden Spikes

Another big enterprise security breach this week, as GoDaddy got hacked.  In typical corporate form, there's no explanation of how this hack was perpetrated.  I wonder if they ...

Read more

Emerging Technology Changes the Game

November, 24, 2012     John Rees

With emergence of new technology comes the emergence of new solutions. The Internet Security market is exploding with new solutions. Now that many have accepted that one of the greatest ...

Read more

A thought on enterprise privacy.

November, 05, 2012     Branden Spikes

Breaches of privacy, like those commonly perpetrated by Google and Microsoft, are just an annoyance for the average user.  Gee, Google might target some ads to me ...

Read more

Epic fail - Cisco runs public RDP server on internal network.

October, 22, 2012     Branden Spikes

Fellow security blogger Brian Krebs posted today about how easy and inexpensive it is for hackers to find hacked servers at Fortune 500 companies.  I don't know about the rest ...

Read more

Root cause disclosure, please.

October, 19, 2012     Branden Spikes

I've been spending a decent amount of time trying to identify the root cause of various high profile hacks happening to companies, and it's pretty surprising how short-sighted or ill-informed ...

Read more

A geeky hacker movie that doesn't suck? Is it possible?

September, 20, 2012     Branden Spikes

This is not a movie review blog, but!  I was so impressed by a movie today at a screening of Jeremy Zerechak's new movie Code 2600.  The movie ...

Read more

What it was like in the Founder Institute?

September, 19, 2012     Branden Spikes

People often ask me, after hearing I joined the Founder Institute for the summer Silicon Valley session, "what was it like?"   "Totally awesome." is my common response.  You ...

Read more

Is the problem with IE, or with browsing in general?

September, 18, 2012     Branden Spikes

I recently read an article on Arstechnica which Clearly points to a need for a solution which doesn't involve updated AV signatures and less use of the exploited browser de ...

Read more

Cookie Authentication = Dangerous

September, 17, 2012     Branden Spikes

This new SSL vulnerability, which affects only people using Chrome on websites using SSL encryption compression, could lead to people getting their online accounts hacked.  How big of ...

Read more

We're losing the cyber war.

September, 10, 2012     Branden Spikes

Recently had the pleasure of reading Marcus Ranum's series on Cyberwar, and it made me think a lot about how we're really losing this war.  The fact that ...

Read more

Is it just as illegal to hack with a conscience?

September, 10, 2012     Branden Spikes

I recently read about this 2.5 year prison sentence for a hacker who ran and and rented access to his huge botnet.  Got me thinking, I wonder if he'd have ...

Read more

Keep informed.