Blog

Why Exfiltration Prevention is Now a Compliance Imperative for Accounting Firms 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 31 Jul 2025

Gone in an Hour: Why Law Firms Can’t Afford to Ignore Data Exfiltration Risks  

Advanced Threat Defense
Preemptive Security

Brad LaPorte | 21 Feb 2025

Navigating Cyber Threats in 2025: Insights from Industry Leaders 

Advanced Threat Defense
Artificial Intelligence
Threat and Vulnerability Management

Brad LaPorte | 03 Dec 2024

How Hackers Compromise Virtual Desktop Infrastructure

Advanced Threat Defense
Automated Moving Target Defense

Michael Gerard | 02 Nov 2022

Servers Aren’t as Secure as You Think

Advanced Threat Defense
Automated Moving Target Defense
Defense-in-Depth
In-Memory Attacks
Linux Security

Assaf Yariv | 16 Sep 2022

Is Your Cyber Security Tamper-Proof?

Advanced Threat Defense

Matthew Delman | 15 Oct 2020

Why Virtual Desktop Infrastructure Is Riskier Than You Realize

Advanced Threat Defense

Join us LIVE to see how Morphisec stops ransomware cold