ZeroLock®: Sealing the Cracks Against Leaky Vessels

“Leaky Vessels” (CVE-2024-21626) is targeting containerized environments and enabling attackers to escape containers and compromise host systems, presenting a critical risk to cloud-native applications. Watch as our Threat Intel Lead, Nathan Montierth,...

Advancing Linux and ESXi Security: An Interview with TAG Infosphere

In an enlightening interview with Edward Amoroso, CEO of TAG Infosphere, our CTO and co-founder, Austin Gadient, delves right into the heart of Linux and ESXi security, unveiling the challenges that drove the creation of ZeroLock®. From his early days in the Air Force...

Breaking Down ESXi

The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes ESXi servers a prime target for...

Securing Linux with AI: Revolutionizing Zero Trust Security 

by Dan Sheehan Within the continually evolving realm of cybersecurity, the Zero Trust model has emerged as a paramount strategy. This approach operates on a simple yet fundamental principle: “Never trust, always verify.”  However, implementing Zero Trust...

The Critical Role of Hypervisor Security in the Financial Sector

Imagine a financial institution where all virtual machines—responsible for everything from customer transactions to trade executions—suddenly go dark. Operations freeze, data is locked, and millions are at stake. This is no hypothetical scenario; it’s the reality...