You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is appl...
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could...
Companies beware: The FBI warns running Windows 7 systems without security updates is high hacking risk
A favored OS by many, the End of Life (EOL)...
Data Center Knowledge, June 2, 2020, with comments by Satya Gupta
An advanced cyber-espionage group is designing malware that can “jump” across air...
Tech Republic, May 29, 2020, with comments by Willy Leichter
Companies are constantly looking for new ways to help their employees handle the drast...
Forbes, May 4, 2020, with comments from Satya Gupta
Organizations know that antivirus software is outmatched in protecting against today’s malware ...
Business Insider, April 11, 2020, with comments by Satya Gupta
“Zooming” has become its own verb that everyone now immediately associates with a co...
As people continue to store their personal information on laptops and mobile devices, the world faces the mounting threat of identity theft. In rec...
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
- Security News
- Cyber Attack
- application aware workload protection
- application aware protection
- runtime protection
- Cyber Security
- Cyber Resilience
- Remote Code Execution
- Public Sector
- RCE Attack
- industrial control system
- Kaseya supply chain ransomware attack
- SolarWinds Attack
- Zero Trust
- Acer Ransomware Attack
- Cloud Security
- Container Protection
- MS Exchange Attack
- Memory Protection
- Microsoft Windows
- National Vulnerability Database
- PrintNightmare vulnerability
- Protect Application Workloads
- REvil ransomware
- Threat Intelligence
- Virsec Security Research Lab
- Water Utility Attack
- information security
- legacy applications
- state government