Empowering businesses with the threat, risk, and compliance management insights they need to succeed.
This blog will review some of the most common types of worker impersonation and how companies can best protect themselves against these attacks.
On November 17, 2022 Todyl’s MXDR team observed new infections from a campaign that included the IcedID Trojan. This new activity targets users in the US with IRS notifications and file names.
In this blog, we cover the architecture of the new web proxy in Todyl's SASE Module and how it powers helps us deliver better security and a faster, more reliable experience.
In this blog, we provide a play-by-play of how Todyl's MXDR team and Endpoint Security (EDR + NGAV) performed during a recent penetration test.
In this blog, we cover what in-memory attacks are, how they can evade detection by traditional anti-virus, and provide an overview of how to detect and stop in-memory attacks with endpoint security.
In this blog, we provide an overview of how the evaluations work, ways to interpret the results, and provide our perspective on how to select an Endpoint Security vendor.
In this blog, we provide background on LAPSUS$, a high-level overview of the Okta breach, and ways Todyl can help to detect and identify malicious activity.
Konstantin Belyalov, Staff Software Engineer at Todyl, discusses the journey that led him here, what he is working on, and his advice to help people become better problem solvers.
In this blog, we cover the various ways that Todyl empowers businesses to implement the principles of zero trust.