Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


CEO
Deterministic Protection: Shifting to the New Normal for Cloud Security
Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, and workloads –...
Read MoreAll Tags
- Blog (237)
- Security News (126)
- Research Lab (26)
- Cybersecurity (23)
- Cyber Attack (21)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (10)
- Ransomware (9)
- Remote Code Execution (8)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- Vulnerability (5)
- ICS/SCADA (4)
- CEO (3)
- Public Sector (3)
- RCE Attack (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- Protect Application Workloads (2)
- SolarWinds Attack (2)
- Zero Trust (2)
- hack (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malware (1)
- Memory Protection (1)
- Microsoft Windows (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- Zero-Day Exploit (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- legacy applications (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)
Insights
The White House Cybersecurity Summit: A Step Forward in the Right Direction
Today the White House hosted a cybersecurity summit to address the rolling headline-making cyberattacks. According to news reports, the federal..
Insights
Defining What it Means to Secure Software in Runtime
The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime.
Runtime is a..
Insights
Blocking the Exploitation of PrintNightmare
Last week, in its Patch Tuesday update, Microsoft Security Response Center released an additional security fix for the series of zero-day..
Insights
Make Cyberattacks Like Hafnium Irrelevant
Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against ..
Insights
The Federal Government’s Bad Cybersecurity Report Card – What’s Next
Public sector organizations have been focused on ‘"incrementally better’ solutions for too long. The cybersecurity industry has a $10.5 trillion..
Insights
Essential Protection for Legacy Applications – Part 1
Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective..
Insights
CTO Perspective: Examination of the REvil Ransomware Attack
By Satya Gupta, Founder and CTO, Virsec
Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more..
Insights
The truth is no organization is un-hackable. As John Chambers, former CEO of Cisco, and current CEO and founder of JC2 Ventures, stated several years..
Insights
Ransomware: A Thriving Business
Ransomware has become an industry unto itself, crippling organizations around the world. Some attacks, such as the recent ones perpetrated against..