
Make Cyberattacks Like Hafnium Irrelevant
Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against Microsoft’s Exchange Servers. China continues to deny the claims, but officials identified Hafnium, (a Chinese-backed hacker group), as the culprits behind the attack. An estimated 30,000 organizations worldwide were ... Read More

Critical Capabilities for Cloud Workload Protection Platforms
The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protection platform. After reviewing the guide and evaluating, two things remain clear—protection must span development and runtime and should include aspects of cloud security posture management. Notable Best Practices from ... Read More

Essential Protection for Legacy Applications – Part 1
Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective protection of legacy applications is a rich and complex topic that we will detail in a series of blog posts over the next several months. Be sure to stay tuned to our ... Read More

CTO Perspective: Examination of the REvil Ransomware Attack
By Satya Gupta, Founder and CTO, Virsec Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more than 200 United States companies. The criminals took advantage of a reduced weekend security workforce to infiltrate up to 1,500 businesses globally, according to Reuters. That ... Read More

Anyone Can Be Hacked
The truth is no organization is un-hackable. As John Chambers, former CEO of Cisco, and current CEO and founder of JC2 Ventures, stated several years ago, “There are two types of companies: those that have been hacked, and those who don't know they have been hacked.” Those we thought would be ... Read More

Ransomware: A Thriving Business
Ransomware has become an industry unto itself, crippling organizations around the world. Some attacks, such as the recent ones perpetrated against the Colonial Pipeline, JBS, and Acer, are discovered quickly. Others can go undetected for longer periods of time, allowing ransomware operators to exploit networks for days or even weeks ... Read More

Behind the Scenes: A Conversation with Virsec’s CTO of the Year
Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Global InfoSec Awards. For the last nine years, the Cyber Defense Magazine Global InfoSec Awards have recognized companies in the information security space who ... Read More

Protecting Industrial Control Systems Against Cyberattacks – Part 3
In the third installment of our series, Protecting Industrial Control Systems Against Cyberattacks, we explore additional risk factors and vulnerabilities facing ICS SCADA systems. If you haven’t already, please go back and read part 1 and part 2 of the series. Vulnerable Points in the SCADA Structure Operators use ... Read More

Behind the Scenes: A Conversation with Virsec’s New VP Public Sector
Virsec continues to grow rapidly, attracting top talent and investors alike. We recently announced that Kevin Jones has joined Virsec as VP Public Sector and Corporate Development. Over the course of his career, Kevin has led Public Sector and government strategies in increasingly senior positions with CrowdStrike, SkyHigh Networks, Symantec, and ... Read More

Behind the Scenes: A Conversation with Virsec’s New CMO, Jennifer Leggio
We’re continually looking to expand our achievements and capabilities as an organization, and over the past few months, we’ve had the opportunity to welcome some fantastic people to our team. Today, we’re excited to announce our newest addition, Chief Marketing Officer, Jennifer Leggio. Jennifer is an experienced leader and executive ... Read More