BLOG POSTS

Joint Webinar with Swimlane: Linux Security That Actually Works
Discover the seamless collaboration between ZeroLock and Swimlane as we delve into a comprehensive exploration of our joint capabilities in this webinar, “Linux Security That Actually Works.” Join Mark Vankempen, Swimlane Sr. Director of...

Exploring Advanced Linux Security and Multi-Cloud Benchmarking Solution
In “Cyber and the Board,” TAG’s 4th quarter 2023 report, Vali Cyber’s CTO, Austin Gadient illustrates how ZeroLock™ safeguards Linux environments by identifying and remediating malicious activity. In addition to ZeroLock's features, gain...

Breaking New Ground: Advancing Linux Security and Resilience in the Enterprise
With great power comes significant vulnerability. “Breaking New Ground: Advancing Linux Security and Resilience in the Enterprise,” a report by TAG, explores the necessity of modernizing our approach to Linux security and how Vali Cyber...

Ransomware in the Education Sector
Over recent years, unrelenting cyber-attacks bombard the education sector. As a result of the pandemic, the shift to remote learning environments created an attractive target out of organizations within higher education. The education...

Vali Cyber™ Secures $15M in Seed Funding to Revolutionize Linux Cybersecurity
Vali Cyber, Inc., a next-generation provider of Linux cybersecurity solutions, announces the successful completion of its seed funding round, raising USD 15 million. The funding round was co-led by Grotech Ventures and the 412 Venture...

Unraveling the Jargon: Understanding Endpoint Security and Beyond
Back in 2013, a game-changing technology called EDR burst onto the scene, revolutionizing our approach to safeguarding our digital domains. This “new” tech sought to supercharge digital forensics on endpoint systems, eliminating the need...

AI Kills Hash Based Detections
Whether it is ChatGPT, GPT4, Bard, or any of the other AI systems competing for public attention, these systems represent a significant leap forward in Malware as a Service (MaaS) capabilities. While it is true there are supposed to be...

A Brief History of NAS Ransomware
It is no secret that NAS devices are frequently targeted by ransomware attacks, and for good reason. Critical data is often stored on devices. Furthermore, NAS devices typically store large amounts of data. NAS devices run Linux operating...