<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
Extend Zero-Trust to Legacy Applications and Workloads

Zero Day Exploit

Extend Zero-Trust to Legacy Applications and Workloads

Large Attack Vector - Unpatched Application Workloads

Read More
Filter By

All Tags

Reset
img

Insights

Three Takeaways from the Billington CyberSecurity Summit

Last week, the Billington CyberSecurity Summit brought together top industry and government leaders to discuss the rising trends and challenges of..

img

Insights

Runtime protection, the mindset shift cloud security needs

For years, companies have adopted cloud infrastructure for ease and speed in deploying applications. However, over the past 18 months, the move to..

img

Insights

The Need to Simplify Compliance Risk Control Implementation

Organizations around the world must fulfill an increasing number of regulatory requirements including NIST, Sarbanes-Oxley Act (SOX), Health..

img

Insights

The White House Cybersecurity Summit: A Step Forward in the Right Direction

Today the White House hosted a cybersecurity summit to address the rolling headline-making cyberattacks. According to news reports, the federal..

img

Insights

Defining What it Means to Secure Software in Runtime

The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime.   

Runtime is a..

img

Insights

Blocking the Exploitation of PrintNightmare

Last week, in its Patch Tuesday update, Microsoft Security Response Center released an additional security fix for the series of zero-day..

img

Insights

Make Cyberattacks Like Hafnium Irrelevant

Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against ..

img

Insights

The Federal Government’s Bad Cybersecurity Report Card – What’s Next

Public sector organizations have been focused on ‘"incrementally better’ solutions for too long. The cybersecurity industry has a $10.5 trillion..
img

Insights

Critical Capabilities for Cloud Workload Protection Platforms

The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protection..

img

Insights

Essential Protection for Legacy Applications – Part 1

Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR