ZeroLock®: Sealing the Cracks Against Leaky Vessels

“Leaky Vessels” (CVE-2024-21626) is targeting containerized environments and enabling attackers to escape containers and compromise host systems, presenting a critical risk to cloud-native applications. Watch as our Threat Intel Lead, Nathan Montierth,...

Advancing Linux and ESXi Security: An Interview with TAG Infosphere

In an enlightening interview with Edward Amoroso, CEO of TAG Infosphere, our CTO and co-founder, Austin Gadient, delves right into the heart of Linux and ESXi security, unveiling the challenges that drove the creation of ZeroLock®. From his early days in the Air Force...

Breaking Down ESXi

The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes ESXi servers a prime target for...

Securing Linux with AI: Revolutionizing Zero Trust Security 

by Dan Sheehan Within the continually evolving realm of cybersecurity, the Zero Trust model has emerged as a paramount strategy. This approach operates on a simple yet fundamental principle: “Never trust, always verify.”  However, implementing Zero Trust...