Blog

Can You Secure Legacy Windows Systems?

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 08 Aug 2025

5 Hidden Weaknesses in Your Linux Stack—And How Attackers Exploit Them 

Fileless Malware
In-Memory Attacks
Linux Security

Brad LaPorte | 06 Dec 2024

Fileless Malware Will Beat Your EDR

Fileless Malware
In-Memory Attacks

Michael Gorelik | 24 Oct 2024

Why Should You Care About In-Memory Attacks?

In-Memory Attacks

Jay Kurup | 10 Sep 2024

Threat Analysis: Morphisec Protects Against PEAKLIGHT In-Memory Malware

Automated Moving Target Defense
Cybersecurity News
In-Memory Attacks
Morphisec Labs
Threat Research

Michael Gerard | 02 Nov 2022

Servers Aren’t as Secure as You Think

Advanced Threat Defense
Automated Moving Target Defense
Defense-in-Depth
In-Memory Attacks
Linux Security