James Shepperd

James Shepperd

Senior Content Manager



16 articles by James Shepperd

Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Which online myths are your kids falling for? Learn how to recognize them

Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Today, with the rise of social media algorithms, viral challenges, and AI-generated content, it has become increasingly difficult to tell what’s real and what’s not.

James Shepperd01 Jul 20257 min. read


Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito Mode: What it does, what it doesn’t do, and why it matters

Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito mode is a useful tool but does not equal complete anonymity.

James Shepperd19 Jun 20256 min. read


Family Safety Online

Highlighting common social engineering attacks for kids

Highlighting common social engineering attacks for kids

Family Safety Online

Highlighting common social engineering attacks for kids

Children are often easy targets for online scams that use fear or fake offers. Learn how social engineering works – and how to protect your child from online threats.

James Shepperd03 Jun 20257 min. read


Endpoint Security and XDR

Racing with MITRE to forge ESET Inspect for SOC and MDR use

Racing with MITRE to forge ESET Inspect for SOC and MDR use

Endpoint Security and XDR

Racing with MITRE to forge ESET Inspect for SOC and MDR use

ESET’s journey through 2024’s TTP-heavy Enterprise ATT&CK evaluation demonstrates both progress and scope for continued enhancement of our detection-and-response solution, as well as an interesting contrast with commercial tests.

James Shepperd23 Dec 20247 min. read


Threat landscape

Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Threat landscape

Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Is it strange that cybersecurity companies would be called to share their expertise in a military simulation of today’s digital battlespace? The answer seems to be a resounding no.

James Shepperd17 Jun 20244 min. read


Endpoint Security and XDR

Future-proofing PC fleets with the powerful pairing of Intel® Threat Detection Technology and AI-Native endpoint protection

Future-proofing PC fleets with the powerful pairing of Intel® Threat Detection Technology and AI-Native endpoint protection

Endpoint Security and XDR

Future-proofing PC fleets with the powerful pairing of Intel® Threat Detection Technology and AI-Native endpoint protection

Everyone enjoys a PC refresh - Processor performance joined by security as an important factor.

James Shepperd10 May 20244 min. read


Threat Intelligence - hidden

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Threat Intelligence - hidden

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Supporting threat hunters and incident response teams with hands-on data is crucial, as it not only safeguards organizations but provides the basis for a proactive prevention-first security strategy.

James Shepperd and André Lameiras25 Apr 20245 min. read


Endpoint Security and XDR

Leveraging automation and UX to reduce admin decision fatigue on detection and response platforms

Leveraging automation and UX to reduce admin decision fatigue on detection and response platforms

Endpoint Security and XDR

Leveraging automation and UX to reduce admin decision fatigue on detection and response platforms

New functions in ESET Inspect (XDR) assist security admins in correlating detections to related entities.

James Shepperd14 Dec 20235 min. read


Threat landscape

Navigating the MOVEit Transfer vulnerabilities

Navigating the MOVEit Transfer vulnerabilities

Threat landscape

Navigating the MOVEit Transfer vulnerabilities

ESET security products detect the webshell payloads seen in the attacks as ASP/Webshell.LZ.

James Shepperd and Márk Szabó21 Jun 20232 min. read