BLOG POSTS

Breaking Down ESXi

Breaking Down ESXi

The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes...

Words Matter (Part 2): Redefining Accountability

Words Matter (Part 2): Redefining Accountability

Those who attempt to blur the lines regarding cybersecurity capabilities should be very afraid. On October 6th, 2021, Deputy Attorney General Lisa O. Monaco announced a new Civil Cyber-Fraud initiative, bringing a new legal tool to hold...

TAG 2023 Security Annual: Special Reprint Edition

TAG 2023 Security Annual: Special Reprint Edition

Revisit Vali Cyber CTO Austin Gadient’s interview with TAG Infosphere in this special reprint edition, accompanied by thought-provoking insights from TAG Infosphere CEO and Founder, Dr. Edward Amoroso, on navigating the intricate realm of...

Ransomware in the Education Sector

Ransomware in the Education Sector

Over recent years, unrelenting cyber-attacks bombard the education sector. As a result of the pandemic, the shift to remote learning environments created an attractive target out of organizations within higher education. The education...

AI Kills Hash Based Detections

AI Kills Hash Based Detections

Whether it is ChatGPT, GPT4, Bard, or any of the other AI systems competing for public attention, these systems represent a significant leap forward in Malware as a Service (MaaS) capabilities. While it is true there are supposed to be...