Few executives doubt their organizations must pay more attention to cybersecurity. Cybercrime costs were estimated at $8.4 trillion globally in 2022 alone, and could exceed $20 trillion by 2026. No organization can afford to ignore this risk.
Read MoreShoe shops and security operation centers have something in common. One size fits all solutions are not a great idea in either area. Unfortunately for security professionals trying to secure Linux servers, purpose-built Linux solutions are...
Read MoreNot long ago, the term “Linux protection” was closer to an oxymoron than a strategy. For security teams and vendors alike, Linux systems were seen as being either immune to cyber threats or not something threat actors targeted.
Read More"Make do and mend." If you work in IT security, this slogan, from a pamphlet issued by the British government in 1943, probably resonates. In security, constant mending—i.e. patching, is a fact of life. So what is virtual patching and why would you...
Read MoreFor small and medium businesses (SMBs), digital transformation has been a double edged sword. Cloud technologies and IoT devices have boosted productivity during a punishing pandemic where every dollar counts. But these advances have come at a cost....
Read MoreIn modern cybersecurity, standards and acronyms are abundant: ISO 27001, CIST, COBIT, GDPR... In the US, National Institute of Standards and Technology (NIST) standards are the go-to for organizations wanting to protect against phishing, ransomware,...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Moving Target Defense (127)
- Cyber Security News (121)
- Morphisec Labs (109)
- Threat Post (57)
- Threat Research (57)
- Morphisec News (52)
- Automated Moving Target Defense (7)
- Defense-in-Depth (6)
- in-memory attacks (6)
- runtime attacks (4)
- Gartner (3)
- Legacy security (3)
- Linux cyber security (3)
- advanced threat defense (3)
- threat and vulnerability management (3)
- ChatGPT (2)
- Gartner endpoint protection (2)
- Ransomware (2)
- financial cybersecurity (2)
- patch management (2)
- Anti-tampering (1)
- Evasive loader (1)
- Fileless malware (1)
- Gartner Emerging Tech (1)
- Healthcare cybersecurity (1)
- IoT security (1)
- Securing IoT devices (1)
- Server security (1)