Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


Zero Day Exploit
Extend Zero-Trust to Legacy Applications and Workloads
Large Attack Vector - Unpatched Application Workloads
Read MoreAll Tags
- Blog (238)
- Security News (126)
- Research Lab (26)
- Cybersecurity (24)
- Cyber Attack (22)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (12)
- Ransomware (10)
- Remote Code Execution (9)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Vulnerability (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- ICS/SCADA (4)
- Microsoft (4)
- CEO (3)
- Protect Application Workloads (3)
- Public Sector (3)
- RCE Attack (3)
- Zero Trust (3)
- Zero-Day Exploit (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft Windows (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- SolarWinds Attack (2)
- hack (2)
- legacy applications (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- CVE (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malicious Attacks (1)
- Malware (1)
- Memory Protection (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- ProxyNotShell (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Platform (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)

Insights
Three Takeaways from the Billington CyberSecurity Summit
Last week, the Billington CyberSecurity Summit brought together top industry and government leaders to discuss the rising trends and challenges of..

Insights
Runtime protection, the mindset shift cloud security needs
For years, companies have adopted cloud infrastructure for ease and speed in deploying applications. However, over the past 18 months, the move to..

Insights
The Need to Simplify Compliance Risk Control Implementation
Organizations around the world must fulfill an increasing number of regulatory requirements including NIST, Sarbanes-Oxley Act (SOX), Health..

Insights
The White House Cybersecurity Summit: A Step Forward in the Right Direction
Today the White House hosted a cybersecurity summit to address the rolling headline-making cyberattacks. According to news reports, the federal..

Insights
Defining What it Means to Secure Software in Runtime
The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime.
Runtime is a..

Insights
Blocking the Exploitation of PrintNightmare
Last week, in its Patch Tuesday update, Microsoft Security Response Center released an additional security fix for the series of zero-day..

Insights
Make Cyberattacks Like Hafnium Irrelevant
Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against ..

Insights
The Federal Government’s Bad Cybersecurity Report Card – What’s Next
Public sector organizations have been focused on ‘"incrementally better’ solutions for too long. The cybersecurity industry has a $10.5 trillion..

Insights
Critical Capabilities for Cloud Workload Protection Platforms
The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protection..

Insights
Essential Protection for Legacy Applications – Part 1
Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective..