<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
ProxyNotShell: A Zero-Day Microsoft Exchange Exploit

Cyber Security

ProxyNotShell: A Zero-Day Microsoft Exchange Exploit

Overview

Read More
Filter By

All Tags

Reset
img

Insights

Enabling Cyber Resilience During COVID-19 Crisis

At Virsec, we understand that cybersecurity remains essential to the state of business, operations, and national security. Even during this pandemic,..

img

Insights

Their Story | Virsec | A Conversation With Willy Leichter

A Their Story interview with Sean Martin and Marco Ciappelli Guest: Willy Leichter

The organization telling us their story today is Virsec.

Listen to..

img

Insights

The Virsec Story: Game-Changing Application Visibility & Protection

 

Virsec's Application Protection Story

The presentation below is from a recorded presentation by Willy Leichter, VP of Marketing and Product..

img

Insights

Memory Errors Top MITRE’s ‘Most Dangerous’ List

With data threats rising, memory buffer errors present the biggest threat to organizations

MITRE has released a new list of the Top 25 Most..

img

Insights

Virsec’s Vaccine Against the Ransomware Epidemic

Virsec delivers unrivaled protection against the most advanced cyberattacks, including those that attempt to encrypt sensitive data and hold it..

img

Insights

Patching the Iron Tail Is Easier Said Than Done

Cyber Defense Magazine, August 13, 2019, by Willy Leichter, Vice President of Marketing, Virsec

Challenges with Patching Industrial Control Systems..

img

Insights

6 Reasons Why Encryption Back Doors Won’t Deter Criminals

Law enforcement, the government, and high-tech companies erupt in disagreement – and private citizens are caught in the middle

Washington DC has..

img

Insights

Prediction Series #12: Moving WAFs to the Cloud Means Dialing Down App Security

As the Cloud Takes Over, Many Organizations Consider WAF Replacement;

Different from a traditional firewall that monitors traffic between servers, a..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR