Blog

Tech Evaluation: Automated Moving Target Defense Research Guide

Brad LaPorte | 06 Dec 2024

Fileless Malware Will Beat Your EDR

Fileless Malware
In-Memory Attacks

Brad LaPorte | 06 Feb 2025

Tech Evaluation: Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 25 Nov 2024

2025 Prediction: Preemptive Cyber Defense Will Shake Up Cybersecurity Planning

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 23 Jan 2025

The Rise of Preemptive Cyber Defense: A Must-Have Strategy for Security Leaders

Continuous Threat Exposure Management (CTEM)

Ido Ikar | 19 Dec 2024

Exploiting Trusted Systems: How Adversarial Attacks Can Manipulate EPSS

Continuous Threat Exposure Management (CTEM)
Defense-in-Depth
Preemptive Security

Brad LaPorte | 05 Dec 2024

Preemptive Cyber Defense: Defending Against Sophisticated Threats Like Salt Typhoon

Adaptive Exposure Management
Automated Moving Target Defense
Preemptive Security

Brad LaPorte | 25 Nov 2024

2025 Prediction: Preemptive Cyber Defense Will Shake Up Cybersecurity Planning

Preemptive Security

Brad LaPorte | 11 Nov 2024

Automated Moving Target Defense is the Future of Cyber—Gartner

Continuous Threat Exposure Management (CTEM)

Brad LaPorte | 29 Oct 2024

Improving Threat Detection with Preemptive Security Solutions

Gartner
Preemptive Security

Jay Kurup | 15 Oct 2024

Dethroning Ransomware: Prominent Attacks Stopped by Morphisec

Automated Moving Target Defense
Preemptive Security
Ransomware

Brad LaPorte | 08 Aug 2024

The Evolution of MDR: Adding Prevention First

Preemptive Security

Jay Kurup | 28 May 2024

Adaptive Cyber Resilience Best Practices

Adaptive Exposure Management
Preemptive Security

Brad LaPorte | 03 Apr 2024

Preventing Ransomware and Advanced Endpoint Threats with Morphisec + Microsoft Defender for Endpoint

Microsoft
Preemptive Security
Ransomware

Brad LaPorte | 12 Feb 2024

Using Annual Loss Expectancy for Cybersecurity Tech Investment Planning

Preemptive Security

Matthew Delman | 01 Oct 2021

Unwanted Gift: Ransomware, Supply Chain Attacks, and How to Prevent Them

Preemptive Security
Ransomware