Latest Articles

Compliance and Regulations

Proposition 24 Has Passed, Creating a New Agency. Will the CCPA Become a Stronger Piece of Legislation?

Proposition 24 Has Passed, Creating a New Agency. Will the CCPA Become a Stronger Piece of Legislation?

Compliance and Regulations

Proposition 24 Has Passed, Creating a New Agency. Will the CCPA Become a Stronger Piece of Legislation?

If you haven't paid much attention to the California Consumer Privacy Act (CCPA), now is the time to care. The California Privacy Rights Act (CPRA) (or Proposition 24) adds stronger privacy protections to the act and establishes the California Privacy Protection Agency. What exactly is changing?

Editor19 Feb 2021


Prevention and Awareness

What blockchain means for enterprises and how to keep it secure

What blockchain means for enterprises and how to keep it secure

Prevention and Awareness

What blockchain means for enterprises and how to keep it secure

Blockchain has created new economies based on cheaper and faster transaction record keeping. But can it survive the audit of cybersecurity folk?

Rene Holt16 Feb 2021


Threat landscape

Supercomputers: A powerful force for growing, and losing, money

Supercomputers: A powerful force for growing, and losing, money

Threat landscape

Supercomputers: A powerful force for growing, and losing, money

The spate of attacks against HPC systems in 2020 highlights a growing threat facing the financial services sector.

Rene Holt15 Feb 2021


Threat landscape

Financial technology companies – big money and data for targeted malware attacks

Financial technology companies – big money and data for targeted malware attacks

Threat landscape

Financial technology companies – big money and data for targeted malware attacks

A Q&A with security researcher Matías Porolli, who has been keeping tabs on the latest activity of Evilnum, a cybercriminal group targeting financial technology (FinTech) companies.

Rene Holt12 Feb 2021


Identity and Data Protection

Using Google Drive? Don't Risk Any Data Leaks

Using Google Drive? Don't Risk Any Data Leaks

Identity and Data Protection

Using Google Drive? Don't Risk Any Data Leaks

Cloud storage is quickly and easily accessible from almost any digital device with an internet connection. It's no wonder that this solution has become so popular among many companies. However, it can also pose a risk to your cybersecurity. Let's take a look at how to protect cloud storage on one of the most popular cloud storage providers – Google Drive.

Editor11 Feb 2021


MDR & Services

Taking Your Business to the Clouds: Why Should the Cloud Become Part of Your IT Infrastructure?

Taking Your Business to the Clouds: Why Should the Cloud Become Part of Your IT Infrastructure?

MDR & Services

Taking Your Business to the Clouds: Why Should the Cloud Become Part of Your IT Infrastructure?

If you’re looking for a way to create a productive and flexible workplace, rely on the cloud. Here are the main advantages you’ll appreciate in the long run.

Editor10 Feb 2021


Identity and Data Protection

Data Privacy Day: Do you know where your data is?

Data Privacy Day: Do you know where your data is?

Identity and Data Protection

Data Privacy Day: Do you know where your data is?

Data Privacy Day aims to raise awareness across the globe about the importance of keeping personal data secure, informing people about the risks associated with the illegal mishandling and unfair processing of their data.

Editor28 Jan 2021


Threat landscape

How Not to Fall Victim to Social Engineering

How Not to Fall Victim to Social Engineering

Threat landscape

How Not to Fall Victim to Social Engineering

Humans are emotional beings, and social engineering is a very effective way to take advantage of that. What’s more, social engineering attacks such as phishing or spreading malicious links don’t usually require highly specific technical skills on the side of the attacker. Forcing thousands of users to give up sensitive information or perform harmful actions has so far proven to be rather easy! Don’t be fooled – even when your business is small, you might still become a target.

Editor25 Jan 2021


Endpoint Security and XDR

EDR spotlight: Countering the FireEye Red Team tools leak

EDR spotlight: Countering the FireEye Red Team tools leak

Endpoint Security and XDR

EDR spotlight: Countering the FireEye Red Team tools leak

ESET releases a 45-strong rule set for ESET Enterprise Inspector to detect the use of FireEye Red Team tools in customer networks

Rene Holt15 Dec 2020


Family Safety Online

Have a holly, jolly, cyber-safe Christmas

Have a holly, jolly, cyber-safe Christmas

Family Safety Online

Have a holly, jolly, cyber-safe Christmas

A short guide to avoiding Christmas scams.

Editor15 Dec 2020


Threat landscape

Empowering your team against sextortion scams

Empowering your team against sextortion scams

Threat landscape

Empowering your team against sextortion scams

Sextortion scams are a growing threat that can cause significant distress and damage to individuals and organizations. IT managers are crucial in ensuring that their teams are informed about these scams and are equipped to respond effectively.

Editor03 Dec 2020


Privacy and Identity Protection

The dangers to cryptocurrency wallets and how to fend them off - Part 2: Diverse threats to hot wallets and cold wallets

The dangers to cryptocurrency wallets and how to fend them off - Part 2: Diverse threats to hot wallets and cold wallets

Privacy and Identity Protection

The dangers to cryptocurrency wallets and how to fend them off - Part 2: Diverse threats to hot wallets and cold wallets

Homoglyph attacks, where malicious links mimic legitimate ones, pose a significant threat to cryptocurrency users. These deceptive links can lead to phishing sites, putting your digital assets at risk. Learn more about the dangers of bad links, the importance of robust security solutions, and discover practical advice for both hot and cold wallet users to safeguard their cryptocurrency.

Rene Holt30 Nov 2020


Prevention first cybersecurity as a service
ESET Home Security