Black Hat , Events , Fraud Management & Cybercrime

Turning Commercial Browsers Into Secure Enterprise Products

Menlo Security Chief Revenue Officer John Wrobel on Thwarting Browser-Based Attacks
John Wrobel, chief revenue officer, Menlo Security

The rise of browser-based attacks makes it essential for organizations to give browsers the same security controls as operating systems, said Menlo Security's John Wrobel.

Commercial browsers are vulnerable to phishing, malware and ransomware, and Wrobel said vulnerabilities in Chrome, Edge or Safari can be used to launch sophisticated attacks. Instead of replacing the user's existing browser, Wrobel said Menlo uses virtual cloud browser technology to enhance security and ensure malware and ransomware are isolated before they reach the endpoint (see: Menlo CEO Amir Ben-Efraim on Beating Highly Evasive Threats).

"We actually render all the active content within our service and then mirror that back to the end user without any degradation in user experience, ensuring that nothing bad can come through the browser in any form," Wrobel said.

In this video interview with Information Security Media Group at Black Hat 2024, Wrobel also discussed:

  • The top vulnerabilities adversaries exploit in modern browsers;
  • Menlo's virtual cloud browser and how it protects against malware;
  • The challenges of driving budget for secure browser adoption.

Wrobel has 20 years of experience and a track record of growing revenue, building teams and developing businesses. Most recently, he was CRO for Skytap, where he forged partnerships with cloud providers. He previously launched and led sales for cloud data services at NetApp, growing revenue from zero to $150 million in just three years, making it NetApp's fastest-growing business.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.