Most enterprises are running a mix of new and old applications and platforms. This includes legacy apps that can’t be easily retired and cutting-ed...
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front ...
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is appl...
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could...
2020 continues to dish out unforeseen difficulties and challenges, many at devastating levels. In the realm of cybersecurity, it’s been no differen...
Brilliance Security Magazine, May 21, 2020, Article by Willy Leichter, Virsec
Living through a pandemic is fraught with difficulty, but one thing is clear. For people fortunate enough to have the option of working from home, ...
Data Center Knowledge, June 2, 2020, with comments by Satya Gupta
An advanced cyber-espionage group is designing malware that can “jump” across air...
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
- Security News
- Cyber Attack
- application aware workload protection
- application aware protection
- runtime protection
- Cyber Security
- Cyber Resilience
- Remote Code Execution
- Cloud Security
- Public Sector
- RCE Attack
- industrial control system
- Kaseya supply chain ransomware attack
- PrintNightmare vulnerability
- SolarWinds Attack
- Zero Trust
- Acer Ransomware Attack
- Container Protection
- MS Exchange Attack
- Memory Protection
- Microsoft Windows
- National Vulnerability Database
- Protect Application Workloads
- REvil ransomware
- Threat Intelligence
- Virsec Security Research Lab
- Water Utility Attack
- billington cybersecurity summit
- information security
- legacy applications
- state government