Houston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...
Read MoreIn recent months AI innovators have rolled out both exciting and concerning AI capabilities. Early this year Microsoft Copilot released new capabilities that while helpful for workflow optimization, heightened the risk of sensitive data exposure and...
Read MoreIn today's rapidly evolving cybersecurity landscape, effective vulnerability management is a cornerstone of maintaining a robust security posture. Yet despite investing significant resources into regular vulnerability assessments and mitigation...
Read MoreIn the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...
Read MoreCyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.
Read MoreWhen it comes to endpoint security, Microsoft Defender for Endpoint stands out as a popular choice. It's the fastest-growing endpoint protection platform, boasting over 19% market share, and for good reason — Microsoft Defender for Endpoint provides...
Read MoreSecurity configurations are the backbone of a robust cybersecurity framework. Ensuring these configurations are correctly set across your environment is crucial for defending against potential breaches.
Read MoreMaintaining a robust security posture is paramount in today’s ever-evolving cybersecurity landscape — and effective security controls management is a critical component of this effort.
Read MoreThe cyber threat landscape is undeniably complex and dynamic. Traditional cybersecurity measures are struggling to detect and stop attacks before they can cause damage. The IBM Cost of a Data Breach Report for 2023 found that only one-third of...
Read MoreAs the threat landscape evolves, it presents ever-increasing risks and costs driven by progressive factors like financial incentives for threat actors, the availability of malware, expanding attack surfaces, and the sophisticated capabilities of...
Read MoreMorphisec announced the launch of the Anti-Ransomware Assurance Suite to help organizations pre-emptively reduce exposure to cyber risk, proactively prevent advance threats and ensure optimal anti-ransomware defense. Powered by Automated Moving...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (153)
- Threat Research (132)
- Cyber Security News (131)
- Morphisec Labs (121)
- Morphisec News (55)
- Defense-in-Depth (12)
- Adaptive Exposure Management (11)
- Gartner (10)
- Ransomware (9)
- Continuous Threat Exposure Management (CTEM) (8)
- In-Memory Attacks (7)
- Threat and Vulnerability Management (5)
- Advanced Threat Defense (4)
- Financial Cybersecurity (4)
- Microsoft (4)
- Runtime Attacks (4)
- ChatGPT (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Legacy Security (3)
- Linux Cybersecurity (3)
- Product Blogs (3)
- Artificial Intelligence (2)
- Healthcare Cybersecurity (2)
- Patch Management (2)
- Preemptive Security (2)
- Anti-tampering (1)
- Case Study (1)
- IoT Security (1)
- Managed Service Providers (1)
- Server Security (1)