Latest Articles

Prevention and Awareness

CISO Interview: How the pandemic helped us meet the needs of our employees

CISO Interview: How the pandemic helped us meet the needs of our employees

Prevention and Awareness

CISO Interview: How the pandemic helped us meet the needs of our employees

Almost eleven years. That is how long Daniel Chromek has been working for ESET. He started as a consultant, and now he manages the internal information security of the whole company.

Editor06 May 2020


Compliance and Regulations

Q&A on the CCPA: Understanding California’s New Data Privacy Law

Q&A on the CCPA: Understanding California’s New Data Privacy Law

Compliance and Regulations

Q&A on the CCPA: Understanding California’s New Data Privacy Law

The new decade brings many challenges and changes to business by introducing a data security law that is the first of its kind stateside: the California Consumer Privacy Act (CCPA).

Editor05 May 2020


Endpoint Security and XDR

Using ESET Products to Manage a Remote Workforce

Using ESET Products to Manage a Remote Workforce

Endpoint Security and XDR

Using ESET Products to Manage a Remote Workforce

As businesses shift to remote work, it’s vital to maintain device visibility and management.

James Shepperd06 Apr 2020


Threat landscape

COVID-19 scams and social engineering capitalize on rapid change

COVID-19 scams and social engineering capitalize on rapid change

Threat landscape

COVID-19 scams and social engineering capitalize on rapid change

COVID-19 scams and social engineering target businesses and capitalize on rapid change.

James Shepperd30 Mar 2020


Prevention and Awareness

Obstacles and opportunities for CFOs

Obstacles and opportunities for CFOs

Prevention and Awareness

Obstacles and opportunities for CFOs

Besides their core business, CFOs face some unfamiliar challenges in the times of the COVID-19 pandemic. Many of them relate to IT or IT security.

James Shepperd27 Mar 2020


Threat landscape

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business

Threat landscape

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business

In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since they can seriously impact business continuity.

Rene Holt19 Feb 2020


Threat landscape

Emotet trojan frustrated by ESET protection

Emotet trojan frustrated by ESET protection

Threat landscape

Emotet trojan frustrated by ESET protection

The Emotet trojan's developers have grown increasingly frustrated as they find themselves blocked by multilayered ESET solutions at every turn.

Rene Holt29 Jan 2020


Threat landscape

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

Threat landscape

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

Taking advantage of the detections already written by ESET’s malware research team is a very effective way to bolster your SOC team’s capabilities.

Rene Holt22 Jan 2020


Identity and Data Protection

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

Identity and Data Protection

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

DNS-over-HTTPS is likely to be more of a double-edged sword.

Rene Holt20 Jan 2020


Prevention first cybersecurity as a service
ESET Resource Center for Business
Your reliable source of educative and enriching digital content