The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protecti...
Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Glob...
In the third installment of our series, Protecting Industrial Control Systems Against Cyberattacks, we explore additional risk factors and vulnerab...
Virsec continues to grow rapidly, attracting top talent and investors alike. We recently announced that Kevin Jones has joined Virsec as VP Public ...
We’re continually looking to expand our achievements and capabilities as an organization, and over the past few months, we’ve had the opportunity t...
The public sector is on alert. Cyber breaches occur at an accelerated rate; attackers are getting more intelligent, more sophisticated, and better ...
Industrial Control Systems (ICS) are the foundation that support numerous industries around the world. They form the backbone of industrialized soc...
Almost every week we see new examples of highly sophisticated organizations and enterprises falling victim to another nation-state cyberattack or o...
Well Designed, Yet Highly Vulnerable
Despite being decades old, SCADA control systems remain well-designed to this day. They bring multiple moving ...
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
- Security News
- Cyber Attack
- application aware workload protection
- application aware protection
- runtime protection
- Cyber Security
- Cyber Resilience
- Remote Code Execution
- Public Sector
- RCE Attack
- industrial control system
- Kaseya supply chain ransomware attack
- SolarWinds Attack
- Zero Trust
- Acer Ransomware Attack
- Cloud Security
- Container Protection
- MS Exchange Attack
- Memory Protection
- Microsoft Windows
- National Vulnerability Database
- PrintNightmare vulnerability
- Protect Application Workloads
- REvil ransomware
- Threat Intelligence
- Virsec Security Research Lab
- Water Utility Attack
- information security
- legacy applications
- state government