<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
Protecting against the Follina CVE Exploit

Cyber Security

Protecting against the Follina CVE Exploit

The Follina remote code execution (RCE) vulnerability in the Microsoft Support Diagnostic Tool (MSDT) was first widely publicized on May 27, 2022....

Read More
Filter By

All Tags

Reset
img

Insights

Five Reasons Memory-Based Cyberattacks Continue to Succeed

Almost every week we see new examples of highly sophisticated organizations and enterprises falling victim to another nation-state cyberattack or..

img

Insights

Protecting Industrial Control Systems Against Cyberattacks - Part 1

Well Designed, Yet Highly Vulnerable

Despite being decades old, SCADA control systems remain well-designed to this day. They bring multiple moving..

img

Insights

Application-Aware Protection Vs. Conventional Security Protection

We sat down with Satya Gupta, Virsec's CTO and Founder, as well as the creator of the Virsec Security Platform, to discuss the technical details of..

img

Insights

When You Can’t Add Cybersecurity Staff Build Cyber-Resiliency Instead

One of the most pressing challenges government entities and the public sector face is how to maintain existing and outdated IT systems without the..

img

Insights

Overcoming Patching Pitfalls

Patching is an incredibly important and vital component in IT, but perhaps we overestimate its ability to solve security problems. There's often an..

img

Insights

Introducing Virsec Security Platform 2.0

We are thrilled to announce the latest release of our security platform, Virsec Security Platform (VSP) 2.0, a powerful solution for container..

img

Insights

Ensuring Security and Compliance for Global Healthcare

Prestigious healthcare systems continue to be at risk for the next devastating ransomware attack or data breach.  Defending against attacks while..

img

Insights

The Need for Zero Trust Workload Protection

Last week we discussed the Four Tenets of Zero Trust Workload Protection. This week we're taking a closer look at the renewed buzz around the concept..

img

Insights

Four Tenets of Zero Trust Workload Protection

To better protect our enterprise systems, the Zero Trust model must be re-defined and expanded to cover applications and cloud workloads during..

img

Insights

Tick ... Tick ... Boom

What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalent..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR