Most enterprises are running a mix of new and old applications and platforms. This includes legacy apps that can’t be easily retired and cutting-ed...
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front ...
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is appl...
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could...
2020 continues to dish out unforeseen difficulties and challenges, many at devastating levels. In the realm of cybersecurity, it’s been no differen...
Brilliance Security Magazine, May 21, 2020, Article by Willy Leichter, Virsec
Living through a pandemic is fraught with difficulty, but one thing is clear. For people fortunate enough to have the option of working from home, ...
Data Center Knowledge, June 2, 2020, with comments by Satya Gupta
An advanced cyber-espionage group is designing malware that can “jump” across air...
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
- Security News
- RCE Attack
- Remote Code Execution
- SolarWinds Attack
- Zero Trust
- Acer Ransomware Attack
- Cloud Security
- Container Protection
- Cyber Attack
- Cyber Resilience
- MS Exchange Attack
- National Vulnerability Database
- Virsec Security Research Lab