Identity and Data Protection


33 articles

Identity and Data Protection

Your passwords and credit cards are their loot: How infostealers work

Your passwords and credit cards are their loot: How infostealers work

Identity and Data Protection

Your passwords and credit cards are their loot: How infostealers work

At ESET’s annual technology conference ETeC 2025, malware researcher Jakub Kaloč explained how cybercriminals run infostealers as a service via a real-life demonstration.

Roman Cuprik03 Nov 2025


Identity and Data Protection

Debunking five myths about business encryption

Debunking five myths about business encryption

Identity and Data Protection

Debunking five myths about business encryption

Let’s set the record straight and see why encryption is the cornerstone of company security.

Márk Szabó09 Jul 2025


Identity and Data Protection

The importance of cybersecurity in healthcare

The importance of cybersecurity in healthcare

Identity and Data Protection

The importance of cybersecurity in healthcare

Data breaches and identity theft can be just as dangerous to your clients as viruses or sepsis. How can you address this? Let’s explore.

Márk Szabó26 Mar 2025


Identity and Data Protection

Securing your digital life: What should your MFA solution feature?

Securing your digital life: What should your MFA solution feature?

Identity and Data Protection

Securing your digital life: What should your MFA solution feature?

Passwords aren't enough. As threats keep evolving, involving multiple layers of authentication is the key to having your accounts protected.

Editorial Team28 Jan 2025


Identity and Data Protection

Beyond the basics: Advanced strategies for VPN protection

Beyond the basics: Advanced strategies for VPN protection

Identity and Data Protection

Beyond the basics: Advanced strategies for VPN protection

A VPN is your shield against cyberattacks, but it could also become your weakness.

Editorial Team21 Jan 2025


Identity and Data Protection

Secure Authentication: Put your cybersecurity helmet on

Secure Authentication: Put your cybersecurity helmet on

Identity and Data Protection

Secure Authentication: Put your cybersecurity helmet on

Multi-factor authentication is a necessity, and now it’s easy to deploy.

Roman Cuprik30 Sep 2024


Identity and Data Protection

Annoying but necessary: How to decrease the burden of authentication requirements

Annoying but necessary: How to decrease the burden of authentication requirements

Identity and Data Protection

Annoying but necessary: How to decrease the burden of authentication requirements

Authentication mechanisms are a vital aspect of cybersecurity deserving adequate protection, but increasing complexity makes them an easier target.

Roman Cuprik02 Aug 2024


Identity and Data Protection

Keeping encryption secure from BitLocker sniffing

Keeping encryption secure from BitLocker sniffing

Identity and Data Protection

Keeping encryption secure from BitLocker sniffing

Encryption has often been the poster child of efficient and secure protection - but even it can fail unless some rather simple security measures are in place to safeguard it.

Márk Szabó27 Feb 2024


Identity and Data Protection

How to limit damage when a device is lost or stolen

How to limit damage when a device is lost or stolen

Identity and Data Protection

How to limit damage when a device is lost or stolen

No matter how vigilant people are, accidents happen, and devices can go missing. Are you prepared to limit the potential damage to your business, should a device fall into the wrong hands?

Editorial Team04 Jan 2024