Popular Resources

Success Story
Success Story

Leading software developer uses Silo for Safe Access to control app access for distributed workforce

A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices 

Read more
Success Story
Success Story

American equipment manufacturer relies on Silo for Research to analyze threats

A Fortune 100 machinery manufacturer uses Silo for Research to identify and analyze potential threats, plus coordinate appropriate actions and communications to mitigate risk.

Read more
FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Resource Type
  • Option1
  • Option2
  • Option3
Video
Video

The Silo Sessions #15: JavaScript template attacks - how do they work?

A local browser can be used by attackers for targeted exploits. Security researcher Michael Schwarz explains JavaScript Template Attacks and how they work

Watch Now
White Paper
White Paper

The billion-dollar security blanket: how security spending overlooks the biggest risk of all

Former director on the National Security Council examines why organizations are still attacked despite massive security investment

Read more
Solution Brief
Solution Brief

Law firms in the digital age

Law firms face a delicate balance — securing their assets and complying with client audit requirements while ensuring employees stay connected and engaged

Read more
Video
Video

Digital trends live: Apple WWDC wrap-up, congress may investigate big tech

Scott Petry, CEO and co-founder of Authentic8, talks about development of a cloud-based web-browsing that protects users from harmful malware

Watch Now
Close
Close