Runtime Security and the Ramifications of Container Contamination

By Julie Chickillo With 96% of organizations actively using containers and Kubernetes1, containers have swiftly emerged as the standard method for deploying compute workloads in the cloud-native environment. This proliferation makes understanding the nuances of...

Virtual Demo: ZeroLock for Hypervisors

Virtual Demo: ZeroLock for Hypervisors Join us for an exclusive walkthrough of ZeroLock, the first-ever Endpoint Detection and Response (EDR) system designed specifically for hypervisors. ZeroLock is compatible with all Linux-based hypervisors, including ESXi,...

Presentation: LinuxFest Northwest 2024

Understand the crucial aspects of container security with Austin Gadient, CTO and Co-founder of Vali Cyber, in his presentation at LinuxFest Northwest 2024. Drawing on his rich background in cybersecurity from his time with the Air Force Research Labs, Austin explores...

What Keeps Me Up at Night as a CISO

By Sue Lapierre  As a Chief Information Security Officer, the notion that perpetually haunts me is not necessarily if my organization will face modern cyber threats, but how well-prepared we are to respond to them.    AI looms as a daunting challenge.  The advent...

ZeroLock: Locking down on XZ Utils Backdoor break-ins

Learn how you can protect your systems against the XZ Utils backdoor (CVE-2024-3094) with Vali Cyber’s ZeroLock. This significant supply chain attack is targeting Linux and Unix-like systems, specifically Debian and Red Hat distributions, posing a severe security...

What does an Ideal Patching Strategy for Linux look like?

by Rob Dalzell Securing your Linux system requires a proactive approach to patch management. For those unfamiliar with the term, patch management is the systematic process of keeping computer systems and software updated with the latest security patches and updates to...