Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Brad LaPorte on December 5, 2024

The cybersecurity landscape continues to evolve, and with it, the need for advanced strategies to combat sophisticated threats. Enter Preemptive Cyber Defense—an innovative approach that’s rapidly gaining traction among organizations looking to...

Read More
Posted by Brad LaPorte on November 25, 2024

The cybersecurity landscape continues to evolve at an unprecedented pace, with 2025 poised to bring even greater complexity and urgency to digital defense strategies. The rapid weaponization of AI technologies is transforming the threat environment,...

Read More
Posted by Morphisec Team on November 13, 2024

Houston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...

Read More
Posted by Brad LaPorte on November 7, 2024

In recent months AI innovators have rolled out both exciting and concerning AI capabilities. Early this year Microsoft Copilot released new capabilities that while helpful for workflow optimization, heightened the risk of sensitive data exposure and...

Read More
Posted by Hanni Barry on September 5, 2024

In today's rapidly evolving cybersecurity landscape, effective vulnerability management is a cornerstone of maintaining a robust security posture. Yet despite investing significant resources into regular vulnerability assessments and mitigation...

Read More
Posted by Brad LaPorte on August 8, 2024

In the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...

Read More
Posted by Brad LaPorte on August 5, 2024

Cyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.

Read More
Posted by Brad LaPorte on July 18, 2024

When it comes to endpoint security, Microsoft Defender for Endpoint stands out as a popular choice. It's the fastest-growing endpoint protection platform, boasting over 19% market share, and for good reason — Microsoft Defender for Endpoint provides...

Read More
Posted by Hanni Barry on July 3, 2024

Security configurations are the backbone of a robust cybersecurity framework. Ensuring these configurations are correctly set across your environment is crucial for defending against potential breaches.

Read More
Posted by Hanni Barry on July 1, 2024

Maintaining a robust security posture is paramount in today’s ever-evolving cybersecurity landscape — and effective security controls management is a critical component of this effort.  

Read More
Posted by Jay Kurup on May 28, 2024

The cyber threat landscape is undeniably complex and dynamic. Traditional cybersecurity measures are struggling to detect and stop attacks before they can cause damage. The IBM Cost of a Data Breach Report for 2023 found that only one-third of...

Read More
Posted by Brad LaPorte on April 25, 2024

As the threat landscape evolves, it presents ever-increasing risks and costs driven by progressive factors like financial incentives for threat actors, the availability of malware, expanding attack surfaces, and the sophisticated capabilities of...

Read More
Posted by Brad LaPorte on April 16, 2024

Morphisec announced the launch of the Anti-Ransomware Assurance Suite to help organizations pre-emptively reduce exposure to cyber risk, proactively prevent advance threats and ensure optimal anti-ransomware defense. Powered by Automated Moving...

Read More
Posted by Jay Kurup on November 28, 2023

Security leaders are acutely aware of vulnerability risks. Organizations continue to allocate thousands of dollars to periodic vulnerability assessments, and thousands more to technology and resources for mitigation — yet vulnerability-based breach...

Read More