Latest Articles

Identity and Data Protection

Securing your digital life: What should your MFA solution feature?

Securing your digital life: What should your MFA solution feature?

Identity and Data Protection

Securing your digital life: What should your MFA solution feature?

Passwords aren't enough. As threats keep evolving, involving multiple layers of authentication is the key to having your accounts protected.

Editor28 Jan 2025


Identity and Data Protection

Beyond the basics: Advanced strategies for VPN protection

Beyond the basics: Advanced strategies for VPN protection

Identity and Data Protection

Beyond the basics: Advanced strategies for VPN protection

A VPN is your shield against cyberattacks, but it could also become your weakness.

Editor21 Jan 2025


Endpoint Security and XDR

Racing with MITRE to forge ESET Inspect for SOC and MDR use

Racing with MITRE to forge ESET Inspect for SOC and MDR use

Endpoint Security and XDR

Racing with MITRE to forge ESET Inspect for SOC and MDR use

ESET’s journey through 2024’s TTP-heavy Enterprise ATT&CK evaluation demonstrates both progress and scope for continued enhancement of our detection-and-response solution, as well as an interesting contrast with commercial tests.

James Shepperd23 Dec 2024


Endpoint Security and XDR

Delivering business security with extended prevention

Delivering business security with extended prevention

Endpoint Security and XDR

Delivering business security with extended prevention

Essential security can take care of most threats – but for businesses with larger networks, it might be time to extend the security envelope.

Márk Szabó17 Dec 2024


Compliance and Regulations

Decoding the NIST Cybersecurity Framework: Building blocks of digital resilience

Decoding the NIST Cybersecurity Framework: Building blocks of digital resilience

Compliance and Regulations

Decoding the NIST Cybersecurity Framework: Building blocks of digital resilience

The NIST Cybersecurity Framework empowers organizations to tackle cybersecurity risks with ease, and the new 2.0 version amps up the game considerably.

Editor12 Dec 2024


Endpoint Security and XDR

The ATT&CK® Evaluations Enterprise 2024 highlights ESET’s AI‑native approach to detection and response

The ATT&CK® Evaluations Enterprise 2024 highlights ESET’s AI‑native approach to detection and response

Endpoint Security and XDR

The ATT&CK® Evaluations Enterprise 2024 highlights ESET’s AI‑native approach to detection and response

NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of MITRE Engenuity.

Editor11 Dec 2024


Prevention and Awareness

How AI shapes cybersecurity: Artificially intelligent cybercrime

How AI shapes cybersecurity: Artificially intelligent cybercrime

Prevention and Awareness

How AI shapes cybersecurity: Artificially intelligent cybercrime

AI can be your strongest ally in the fight against cybercrime, but it can just as easily become a tool for the hackers targeting you.

Editor21 Nov 2024


Compliance and Regulations

Cyber Insurance: A catalyst for proactive business security

Cyber Insurance: A catalyst for proactive business security

Compliance and Regulations

Cyber Insurance: A catalyst for proactive business security

While cyber insurance is not a cyber protection method, it might have its place in your company's overall security strategy.

Editor14 Nov 2024


Endpoint Security and XDR

ETeC 2024: Why botnet tracking is so effective

ETeC 2024: Why botnet tracking is so effective

Endpoint Security and XDR

ETeC 2024: Why botnet tracking is so effective

ESET has been successfully utilizing botnet tracking for years.

Roman Cuprik08 Nov 2024


Prevention first cybersecurity as a service
ESET Resource Center for Business
Your reliable source of educative and enriching digital content