<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
Deterministic Protection: Shifting to the New Normal for Cloud Security

CEO

Deterministic Protection: Shifting to the New Normal for Cloud Security

Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, and workloads –...

Read More
Filter By

All Tags

Reset
img

Insights

Application-Aware Protection Vs. Conventional Security Protection

We sat down with Satya Gupta, Virsec's CTO and Founder, as well as the creator of the Virsec Security Platform, to discuss the technical details of..

img

Insights

When You Can’t Add Cybersecurity Staff Build Cyber-Resiliency Instead

One of the most pressing challenges government entities and the public sector face is how to maintain existing and outdated IT systems without the..

img

Insights

Overcoming Patching Pitfalls

Patching is an incredibly important and vital component in IT, but perhaps we overestimate its ability to solve security problems. There's often an..

img

Insights

Introducing Virsec Security Platform 2.0

We are thrilled to announce the latest release of our security platform, Virsec Security Platform (VSP) 2.0, a powerful solution for container..

img

Insights

Ensuring Security and Compliance for Global Healthcare

Prestigious healthcare systems continue to be at risk for the next devastating ransomware attack or data breach.  Defending against attacks while..

img

Insights

The Need for Zero Trust Workload Protection

Last week we discussed the Four Tenets of Zero Trust Workload Protection. This week we're taking a closer look at the renewed buzz around the concept..

img

Insights

Four Tenets of Zero Trust Workload Protection

To better protect our enterprise systems, the Zero Trust model must be re-defined and expanded to cover applications and cloud workloads during..

img

Insights

Tick ... Tick ... Boom

What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalent..

img

Insights

Five Reasons EDR & EPP Solutions Cannot Protect Application Workloads

There are five key areas where EDR and EPP technology isn’t suited to analyze behavior in applications, on servers or processes that occur during..

img

Insights

Hafnium & Exchange: Elements of the Attack

The ongoing attacks on Microsoft Exchange servers by the Hafnium cyber espionage group appear to be escalating, and potentially impacting a wider..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR