Four Tenets of Zero Trust Workload Protection

Four Tenets of Zero Trust Workload Protection

| | Cybersecurity, zero trust
To better protect our enterprise systems, the Zero Trust model must be re-defined and expanded to cover applications and cloud workloads during runtime. This is the only way to ensure that the right code and processes can execute and nothing else, regardless of the threat environment. 1. ‘We’ve Never Seen ... Read More
Tick ... Tick ... Boom

Tick … Tick … Boom

What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalent threat will be ransomware. Strap in tight – the $50M Acer ransomware attack is just the beginning. What do you do when threat actors are ... Read More
Five Reasons EDR & EPP Solutions Cannot Protect Application Workloads

Five Reasons EDR & EPP Solutions Cannot Protect Application Workloads

| | EPP/EDR
There are five key areas where EDR and EPP technology isn’t suited to analyze behavior in applications, on servers or processes that occur during runtime. Applications on Server/Workloads are fundamentally different than those running on devices. Applications running on your servers and workloads and those running on devices and laptops ... Read More
Why the SolarWinds Attack Easily Slipped by All EDR/EPP Solutions

Why the SolarWinds Attack Easily Slipped by All EDR/EPP Solutions

| | EPP/EDR, SolarWinds
The SolarWinds attack was a brutal security failure that continues to impact the US government, agencies, and thousands of businesses. To the dismay of many, Endpoint Detection and Response (EDR) and Endpoint Protection Platform (EPP) solutions did not have any role in seeing or stopping the SolarWinds attack whatsoever. As ... Read More
Introducing Our New Chief Security Advisor

Introducing Our New Chief Security Advisor

|
It’s been an exciting few weeks here at Virsec! We’re building even more enthusiasm as we are beyond excited to announce a new addition to our leadership team. Jim Routh has joined the company as Chief Security Advisor and Board Participant. Jim is a seasoned cybersecurity leader who recognizes the ... Read More
John Chambers Joins Virsec as an Investor and Strategic Advisor

John Chambers Joins Virsec as an Investor and Strategic Advisor

|
It’s been an exciting week here at Virsec! We are thrilled to announce that industry expert John Chambers has officially joined the team as an investor and strategic advisor. In a career that spans 30 years, John has focused on helping disruptive startups from around the world build and scale ... Read More
Leave No Apps Behind: Protection from Legacy to Cloud to Containers

Leave No Apps Behind: Protection from Legacy to Cloud to Containers

| | Blog
Most enterprises are running a mix of new and old applications and platforms. This includes legacy apps that can’t be easily retired and cutting-edge tools in cloud, hybrid, container and serverless environments. “Leave no apps behind’ means you’ve got to protect everything in your system. Back end applications that power ... Read More
Eliminate Blind Spots: Protect the Full Application Stack

Eliminate Blind Spots: Protect the Full Application Stack

| | Blog
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front gate but forgetting to lock it doesn’t provide much of a deterrent. Protecting web applications in today’s cyber security environment poses a comparable ... Read More
Prepare for a Different Fight: Runtime Is the New Battleground

Prepare for a Different Fight: Runtime Is the New Battleground

| | Blog
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is applications themselves, during runtime and all that involves, including files, processes, libraries, memory usage, and web inputs. This also includes process memory and entire server ... Read More
Change Your Thinking: Turn Conventional Security Inside Out

Change Your Thinking: Turn Conventional Security Inside Out

| | Blog
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could raise the drawbridge and leave the crocodiles in the moat to guard the kingdom’s crown jewels. Every organization has its own crown jewels to ... Read More

Secure Guardrails