From Execs who were transparent and employees who gave their all to get systems back online, Norsk Hydro sets a rare stellar example
At the midpoint of 2019, we’re taking a look at our past and future predictions--We invite you to share your feedback
Death, taxes….and cyber threats
In 1789, Benjamin Franklin wrote in a letter, “Our new Constitution is now established, and has an appearance that ...
Crimes reached $2.7 billion across victims of all ages, primarily over age 50
Near the end of April, the FBI released the annual report – The Internet...
Attack attempts involving EternalBlue now number in the hundreds of thousands daily
No Quick Fix for Chip Flaw in Sight;
A year following the revelation of Spectre and Meltdown chip flaws, a new flaw – Spoiler - has been discovered th...
Prediction Series #13 Final: For Defending Against 2019 Application Security Threats, Virsec Has You Covered
In our Prediction blog series for 2019, we’ve outlined in 12 blogs 12 troubling areas where we expect cyber threats to expand this year.
As the Cloud Takes Over, Many Organizations Consider WAF Replacement;
Different from a traditional firewall that monitors traffic between servers, a w...
Prediction Series #11: Servers and endpoints differ vastly from each other & cannot be protected by the same means
Priorities for servers, apps, and cloud workloads are shifting
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
- Security News
- Cyber Attack
- application aware workload protection
- application aware protection
- runtime protection
- Cyber Security
- Cyber Resilience
- Remote Code Execution
- Public Sector
- RCE Attack
- industrial control system
- Kaseya supply chain ransomware attack
- SolarWinds Attack
- Zero Trust
- Acer Ransomware Attack
- Cloud Security
- Container Protection
- MS Exchange Attack
- Memory Protection
- Microsoft Windows
- National Vulnerability Database
- PrintNightmare vulnerability
- Protect Application Workloads
- REvil ransomware
- Threat Intelligence
- Virsec Security Research Lab
- Water Utility Attack
- information security
- legacy applications
- state government