Blog

Why Exfiltration Prevention is Now a Compliance Imperative for Accounting Firms 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 08 Aug 2025

5 Hidden Weaknesses in Your Linux Stack—And How Attackers Exploit Them 

Fileless Malware
In-Memory Attacks
Linux Security

Brad LaPorte | 14 Jul 2025

Linux Is No Longer Immune: Why Ransomware Gangs Are Going All-In on Linux Targets 

Linux Security

Michael Gerard | 02 Nov 2022

Servers Aren’t as Secure as You Think

Advanced Threat Defense
Automated Moving Target Defense
Defense-in-Depth
In-Memory Attacks
Linux Security

Hudi Zack | 12 Oct 2022

How Can We Secure the IoT?

Linux Security

Morphisec Team | 24 Sep 2020

Proactive Cloud Workload Security Strategy

Linux Security
Preemptive Security

Join us LIVE to see how Morphisec stops ransomware cold