Leave No Apps Behind: Extend Protection from Legacy to Cloud to Containers

| | Blog
Most enterprises are running a mix of new and old applications and platforms. This includes legacy apps that can’t be easily retired and cutting-edge tools in cloud, hybrid, container and serverless environments. “Leave no apps behind’ means you’ve got to protect everything in your system. Back end applications that power ... Read More

Eliminate Blind Spots: Protect the Full Application Stack

| | Blog
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front gate but forgetting to lock it doesn’t provide much of a deterrent. Protecting web applications in today’s cyber security environment poses a comparable ... Read More

Prepare for a Different Fight: Runtime Is the New Battleground

| | Blog
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is applications themselves, during runtime and all that involves, including files, processes, libraries, memory usage, and web inputs. This also includes process memory and entire server ... Read More

Change Your Thinking: Turn Conventional Security Inside Out

| | Blog
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could raise the drawbridge and leave the crocodiles in the moat to guard the kingdom’s crown jewels. Every organization has its own crown jewels to ... Read More

The Ransomware Tsunami Continues Slamming Healthcare & Banks

| | Blog, Security News
2020 continues to dish out unforeseen difficulties and challenges, many at devastating levels. In the realm of cybersecurity, it’s been no different. In January of this year, during research for a Cynet Breach Protection Report*, cybersecurity professionals were asked to rank threats according to perceived level of seriousness. Ransomware is ... Read More
Virsec  on TechStrong TV July 2020

Transcription: Virsec Featured on TechStrong TV

| | Blog
Watch video interview Speakers: Charlene O’Hanlon, Managing Editor, MediaOps Dave Furneaux, Virsec CEO Charlene: Hey everybody, welcome back to TechStrong TV. I’m Charlene O’Hanlon, Managing Editor at MediaOps. I am here now with Dave Furneaux who is the new CEO of a company called Virsec. Thanks for much for taking ... Read More

New Malware Hides Inside Rogue Virtual Machines

| | Blog
Data Center Knowledge, June 2, 2020, with comments from Satya Gupta. Security experts identify a new worrisome threat vector, but not all of them agree it has legs. Malware operators are always seeking new ways to infiltrate networks without being noticed. Their latest method of where to conceal their ill-intentioned ... Read More
Understand Virsec in 3 Minutes

New Malware Makes Air-Gapped Data Center Networks Less Bulletproof

| | Blog
Data Center Knowledge, June 2, 2020, with comments by Satya Gupta An advanced cyber-espionage group is designing malware that can “jump” across air gaps, researchers say. For years, teams have relied on air gapping from the Internet to keep networks protected from cyber criminals and the public Internet. Being gapped ... Read More

Mental Health Awareness Month Highlights Struggles of Working from Home During Pandemic

| | Blog
Tech Republic, May 29, 2020, with comments by Willy Leichter Companies are constantly looking for new ways to help their employees handle the drastic changes to how we all work. The month of May was Mental Health Awareness Month and the timing was apropos as the country has faced many ... Read More
Virsec Overview: Protecting Against Advanced Cyberattacks

Defending Against The New Reality Of Fileless Malware Attacks

| | Blog
Forbes, May 4, 2020, with comments from Satya Gupta Organizations know that antivirus software is outmatched in protecting against today’s malware threats. The threats we’re seeing today have surprised what signatures can see or identify, much less block. Modern malware is capable of continually morphing itself - otherwise known as ... Read More