Blog

Proactive Cloud Workload Security Strategy 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 25 Nov 2024

2025 Prediction: Preemptive Cyber Defense Will Shake Up Cybersecurity Planning

Preemptive Security

Brad LaPorte | 11 Nov 2024

Automated Moving Target Defense is the Future of Cyber—Gartner

Adaptive Exposure Management
Continuous Threat Exposure Management (CTEM)
Gartner
Preemptive Security

Brad LaPorte | 29 Oct 2024

Improving Threat Detection with Preemptive Security Solutions

Gartner
Preemptive Security

Jay Kurup | 15 Oct 2024

Dethroning Ransomware: Prominent Attacks Stopped by Morphisec

Automated Moving Target Defense
Preemptive Security
Ransomware

Brad LaPorte | 08 Aug 2024

The Evolution of MDR: Adding Prevention First

Adaptive Exposure Management
Continuous Threat Exposure Management (CTEM)
Managed Service Providers
Preemptive Security

Jay Kurup | 28 May 2024

Adaptive Cyber Resilience Best Practices

Adaptive Exposure Management
Preemptive Security

Brad LaPorte | 03 Apr 2024

Preventing Ransomware and Advanced Endpoint Threats with Morphisec + Microsoft Defender for Endpoint

Microsoft
Preemptive Security
Ransomware

Brad LaPorte | 12 Feb 2024

Using Annual Loss Expectancy for Cybersecurity Tech Investment Planning

Preemptive Security

Matthew Delman | 01 Oct 2021

Unwanted Gift: Ransomware, Supply Chain Attacks, and How to Prevent Them

Preemptive Security
Ransomware