Make Cyberattacks Like Hafnium Irrelevant

Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against Microsoft’s Exchange Servers. China continues to deny the claims, but officials identified Hafnium, (a … Continue reading Make Cyberattacks Like Hafnium Irrelevant

Essential Protection for Legacy Applications – Part 1

Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective protection of legacy applications is a rich and complex topic that we will detail in a series of blog… Continue reading Essential Protection for Legacy Applications – Part 1

CTO Perspective: Examination of the REvil Ransomware Attack

By Satya Gupta, Founder and CTO, Virsec
Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more than 200 United States companies. The criminals took advantage of a reduced weekend security work… Continue reading CTO Perspective: Examination of the REvil Ransomware Attack

Behind the Scenes: A Conversation with Virsec’s CTO of the Year

Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Global InfoSec Awards. 
 For the last nine years, the Cyber Defense Magazine Global InfoSec Awards have … Continue reading Behind the Scenes: A Conversation with Virsec’s CTO of the Year

Five Reasons Memory-Based Cyberattacks Continue to Succeed

Almost every week we see new examples of highly sophisticated organizations and enterprises falling victim to another nation-state cyberattack or other security breach. These attacks are circumventing staple security products such as next-gen fire… Continue reading Five Reasons Memory-Based Cyberattacks Continue to Succeed

Protecting Industrial Control Systems Against Cyberattacks – Part 1

Well Designed, Yet Highly Vulnerable
Despite being decades old, SCADA control systems remain well-designed to this day. They bring multiple moving parts together – computers, networks, data communications and user interfaces – to manage machinery … Continue reading Protecting Industrial Control Systems Against Cyberattacks – Part 1

Application-Aware Protection Vs. Conventional Security Protection

We sat down with Satya Gupta, Virsec’s CTO and Founder, as well as the creator of the Virsec Security Platform, to discuss the technical details of application-aware workload protection. 
 
What Does Application-Aware Mean?
Application awareness” … Continue reading Application-Aware Protection Vs. Conventional Security Protection