Editor

Editor


Thoughtful pieces written by guest authors, including security experts and industry thought leaders.


140 articles by Editor

Endpoint Security and XDR

Optimized Malware Detection from ESET & Intel

Optimized Malware Detection from ESET & Intel

Endpoint Security and XDR

Optimized Malware Detection from ESET & Intel

The combined Intel and ESET solutions use AI to analyze CPU telemetry to provide advanced detection against new and existing strains of malware—especially ransomware.

Editor11 Oct 20244 min. read


Featured

Introduction to security frameworks: Where to start?

Introduction to security frameworks: Where to start?

Featured

Introduction to security frameworks: Where to start?

While cybersecurity frameworks may appear complex, it often isn’t the case. How to understand them and use them to your advantage? Dušan Kaštan, the cybersecurity specialist from ESET, offers his perspective and valuable advice.

Editor22 Aug 20247 min. read


Featured

Stay safe, stay smart: Why security training matters

Stay safe, stay smart: Why security training matters

Featured

Stay safe, stay smart: Why security training matters

Security trainings can be a chore, but with some creativity, even mundane tests can be turned into engaging experiences.

Editor06 Aug 20245 min. read


Featured

Implementing effective web controls for enhanced cybersecurity and productivity

Implementing effective web controls for enhanced cybersecurity and productivity

Featured

Implementing effective web controls for enhanced cybersecurity and productivity

Employees often spend their workday on computers, where harmless web browsing can quickly turn into a risky encounter with malware.

Editor15 Jul 20243 min. read


Featured

A strategic blueprint for proactive risk assessment and data security

A strategic blueprint for proactive risk assessment and data security

Featured

A strategic blueprint for proactive risk assessment and data security

By integrating preventive measures into the initial phase of security risk management, organizations can proactively address vulnerabilities and mitigate potential threats

Editor07 Jun 20246 min. read


Featured

Cloud security: Native app protection is not an end but rather a beginning

Cloud security: Native app protection is not an end but rather a beginning

Featured

Cloud security: Native app protection is not an end but rather a beginning

Additional security doesn’t necessarily have to increase the complexity of an IT professional’s job .

Editor21 May 20244 min. read


Featured

Ahead of the game: Embracing prevention for substantial cost-effectiveness

Ahead of the game: Embracing prevention for substantial cost-effectiveness

Featured

Ahead of the game: Embracing prevention for substantial cost-effectiveness

Prevention is increasingly being recognized as the most cost-effective strategy in combating cyber attacks.

Editor25 Apr 20244 min. read


Featured

Vulnerability management – An essential component of prevention

Vulnerability management – An essential component of prevention

Featured

Vulnerability management – An essential component of prevention

Proactive vulnerability tracking and timely patching are crucial to prevent data breaches, yet often overlooked due to their time-consuming nature.

Editor24 Apr 20243 min. read


Featured

Overlooking mobile security? Here’s why you shouldn’t

Overlooking mobile security? Here’s why you shouldn’t

Featured

Overlooking mobile security? Here’s why you shouldn’t

While safeguarding our computers is widely recognized as essential, what about the devices that often accompany us from the moment we wake up? Discover more about mobile threats and learn how to effectively protect yourself from them.

Editor23 Apr 20245 min. read