<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
Deterministic Protection: Shifting to the New Normal for Cloud Security

CEO

Deterministic Protection: Shifting to the New Normal for Cloud Security

Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, and workloads –...

Read More
Filter By

All Tags

Reset
img

Insights

When You Can’t Add Cybersecurity Staff Build Cyber-Resiliency Instead

One of the most pressing challenges government entities and the public sector face is how to maintain existing and outdated IT systems without the..

img

Insights

Overcoming Patching Pitfalls

Patching is an incredibly important and vital component in IT, but perhaps we overestimate its ability to solve security problems. There's often an..

img

Insights

Introducing Virsec Security Platform 2.0

We are thrilled to announce the latest release of our security platform, Virsec Security Platform (VSP) 2.0, a powerful solution for container..

img

Insights

Ensuring Security and Compliance for Global Healthcare

Prestigious healthcare systems continue to be at risk for the next devastating ransomware attack or data breach.  Defending against attacks while..

img

Insights

The Need for Zero Trust Workload Protection

Last week we discussed the Four Tenets of Zero Trust Workload Protection. This week we're taking a closer look at the renewed buzz around the concept..

img

Insights

Four Tenets of Zero Trust Workload Protection

To better protect our enterprise systems, the Zero Trust model must be re-defined and expanded to cover applications and cloud workloads during..

img

Insights

Tick ... Tick ... Boom

What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalent..

img

Insights

Five Reasons EDR & EPP Solutions Cannot Protect Application Workloads

There are five key areas where EDR and EPP technology isn’t suited to analyze behavior in applications, on servers or processes that occur during..

img

Insights

Why the SolarWinds Attack Easily Slipped by All EDR/EPP Solutions

EDR/EPP Solutions Were Unable to Identify or Stop the SolarWinds Attack

 

The SolarWinds attack was a brutal security failure that continues to..

img

Insights

Introducing Our New Chief Security Advisor

It’s been an exciting few weeks here at Virsec! We’re building even more enthusiasm as we are beyond excited to announce a new addition to our..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR