Stay ahead of digital threats with insights from a cybersecurity leader
Roman Cuprik • 09 Apr 2026 • 11 min. read
Threat landscape
What are EDR killers? How ransomware attacks disable EDR and how to stop it
Roman Cuprik • 31 Mar 2026 • 9 min. read
Cloud and Application Security
Phishing is now more dangerous than ever. Businesses need new tools.
Roman Cuprik • 24 Mar 2026 • 8 min. read
Threat Intelligence
Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports
Why threat intelligence is at the heart of security integration
Prevention and Awareness
How to take legacy operational technology (OT) risks in manufacturing head-on
Compliance and Regulations
GDPR vs. CCPA: How do they affect businesses across the US?
This quick guide breaks down the key differences and similarities to help you stay compliant on both sides of the Atlantic.
Editorial Team • 01 Jun 2021
Want to build a cyber-aware culture? Find a way to pass on knowledge without scaring employees
Cybersecurity training isn’t a one-and-done deal. Like cramming for a test, if you don’t use it, you lose it. Ongoing education keeps your team sharp — and your business safer.
Editorial Team • 24 May 2021
Identity and Data Protection
How to back up your company’s data: From prevention to recovery
Prevention is always cheaper than recovery, hence backups play an important role in keeping companies running.
Editorial Team • 27 Apr 2021
Impersonation: When an attacker is posing as the CEO
How do you recognize when you are contacted by a cybercriminal instead of your colleague?
Editorial Team • 05 Apr 2021
Microsoft Exchange exploits – step one in ransomware chain
Once attackers gain a foothold on web servers, there are all manner of nasty tricks and malware they can leverage immediately or put into play later – like ransomware.
Aryeh Goretsky • 29 Mar 2021
How menacing are the latest trends in ransomware?
Ransomware is a top threat for small and mid-sized businesses. Even if you know the risks, attackers are relentless — targeting databases, servers, and smartphones. One weak spot is all it takes.
Editorial Team • 23 Mar 2021
What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?
Before ESET shone the light on a slew of APT groups exploiting vulnerabilities in Exchange servers around the world, a smaller number were using zero days in targeted attacks – leading CISOs to reconsider their security approach.
Rene Holt • 18 Mar 2021
How to convince your CEO to invest in a VPN
More remote work means more data flowing online — making a VPN essential. As an IT manager, you get it. But if your CEO doesn’t, here are simple reasons to help make the case (and save you the debate).
Editorial Team • 25 Feb 2021
Why use a VPN today? Key benefits of employing a virtual private network
With remote work and digitalization on the rise, VPNs are more crucial than ever.
Editorial Team • 23 Feb 2021
Sign up for our newsletters
Thank you! Please check your email and confirm your subscription.