Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


CEO
Deterministic Protection: Shifting to the New Normal for Cloud Security
Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, and workloads –...
Read MoreAll Tags
- Blog (237)
- Security News (126)
- Research Lab (26)
- Cybersecurity (23)
- Cyber Attack (21)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (10)
- Ransomware (9)
- Remote Code Execution (8)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- Vulnerability (5)
- ICS/SCADA (4)
- CEO (3)
- Public Sector (3)
- RCE Attack (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- Protect Application Workloads (2)
- SolarWinds Attack (2)
- Zero Trust (2)
- hack (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malware (1)
- Memory Protection (1)
- Microsoft Windows (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- Zero-Day Exploit (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- legacy applications (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)

Insights
Cybersecurity for the Public Sector: Partnering with Carahsoft
The public sector is on alert. Cyber breaches occur at an accelerated rate; attackers are getting more intelligent, more sophisticated, and better..

Insights
Virsec Analysis of the Colonial Pipeline Attack
The Colonial Pipeline attack on Friday, May 7th, 2021 represents another in a series of advanced cyber threats, and one of the most serious incidents..

Insights
Protecting Industrial Control Systems Against Cyberattacks - Part 2
Industrial Control Systems (ICS) are the foundation that support numerous industries around the world. They form the backbone of industrialized..

Insights
Five Reasons Memory-Based Cyberattacks Continue to Succeed
Almost every week we see new examples of highly sophisticated organizations and enterprises falling victim to another nation-state cyberattack or..

Insights
Protecting Industrial Control Systems Against Cyberattacks - Part 1
Well Designed, Yet Highly Vulnerable
Despite being decades old, SCADA control systems remain well-designed to this day. They bring multiple moving..

Insights
Application-Aware Protection Vs. Conventional Security Protection
We sat down with Satya Gupta, Virsec's CTO and Founder, as well as the creator of the Virsec Security Platform, to discuss the technical details of..

Insights
When You Can’t Add Cybersecurity Staff Build Cyber-Resiliency Instead
One of the most pressing challenges government entities and the public sector face is how to maintain existing and outdated IT systems without the..

Insights
Patching is an incredibly important and vital component in IT, but perhaps we overestimate its ability to solve security problems. There's often an..

Insights
Introducing Virsec Security Platform 2.0
We are thrilled to announce the latest release of our security platform, Virsec Security Platform (VSP) 2.0, a powerful solution for container..

Insights
Ensuring Security and Compliance for Global Healthcare
Prestigious healthcare systems continue to be at risk for the next devastating ransomware attack or data breach. Defending against attacks while..