<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
Deterministic Protection: Shifting to the New Normal for Cloud Security

CEO

Deterministic Protection: Shifting to the New Normal for Cloud Security

Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, and workloads –...

Read More
Filter By

All Tags

Reset
img

Insights

Defining What it Means to Secure Software in Runtime

The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime.   

Runtime is a..

img

Insights

Blocking the Exploitation of PrintNightmare

Last week, in its Patch Tuesday update, Microsoft Security Response Center released an additional security fix for the series of zero-day..

img

Insights

Make Cyberattacks Like Hafnium Irrelevant

Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against ..

img

Insights

The Federal Government’s Bad Cybersecurity Report Card – What’s Next

Public sector organizations have been focused on ‘"incrementally better’ solutions for too long. The cybersecurity industry has a $10.5 trillion..
img

Insights

Critical Capabilities for Cloud Workload Protection Platforms

The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protection..

img

Insights

Essential Protection for Legacy Applications – Part 1

Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective..

img

Insights

We Raised $100M. Now We Further Redefine How Software is Secured.

As the only cybersecurity company to fully protect software wherever it runs in real-time, this financial ammunition advances our mission of making..
img

Insights

CTO Perspective: Examination of the REvil Ransomware Attack

By Satya Gupta, Founder and CTO, Virsec

Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more..

img

Insights

Anyone Can Be Hacked

The truth is no organization is un-hackable. As John Chambers, former CEO of Cisco, and current CEO and founder of JC2 Ventures, stated several years..

img

Insights

Ransomware: A Thriving Business

Ransomware has become an industry unto itself, crippling organizations around the world. Some attacks, such as the recent ones perpetrated against..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR