Márk Szabó

Márk Szabó

Security Writer


Education?
Master's in International Relations and European Politics.

Position and history at ESET?
Joined in early 2023 as Junior PR and Security Writer. 

What malware do you hate the most?
I don’t hate malware; I find it annoying. Makes us all more paranoid.

What is your golden rule for cyberspace?
Privacy is key. That and be conscious about your data online.

Favorite activities?
Browsing Wikipedia leisurely or gaming.

When did you get your first computer and what kind was it?
Depends. I started with a PS1, but I acquired an old custom PC in the early 2000s – wasn’t much but it served me well for years. Plus, it inspired me to build my own.

Favorite computer game/activity?
Tough question. I love grand strategy games, but I’ve spent most of my time playing various RPGs.


77 articles by Márk Szabó

Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Why zero trust is critical for healthcare cybersecurity

Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Despite pressure from regulators and diligent efforts to bolster cybersecurity, attacks are common and healthcare organizations remain at substantial risk.

Márk Szabó and Jakub Filip07 Apr 202610 min. read


Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

How to take legacy operational technology (OT) risks in manufacturing head-on

Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

Do you know how to bridge the gap between legacy risks and modern security needs?

Márk Szabó01 Apr 202610 min. read


Threat landscape

Why threat intelligence is at the heart of security integration

Why threat intelligence is at the heart of security integration

Threat landscape

Why threat intelligence is at the heart of security integration

Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.

Márk Szabó25 Mar 20267 min. read


Cloud and Application Security

In the crosshairs: Securing cloud workloads with bespoke solutions

In the crosshairs: Securing cloud workloads with bespoke solutions

Cloud and Application Security

In the crosshairs: Securing cloud workloads with bespoke solutions

With regulations like DORA, third-party risk gains new consequences.

Márk Szabó23 Mar 20267 min. read


Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

You’ve got mail: How to secure your Microsoft Exchange server

Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

Are email servers doomed to eternal vulnerability? International cybersecurity partners think otherwise.

Márk Szabó11 Mar 20268 min. read


Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Why Internet of Things (IoT) devices remain easy targets for hackers

Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Is IoT adoption a double-edged sword? Discover why our homes and businesses are paradoxically becoming less secure with the rise of connected devices.

Márk Szabó23 Feb 20267 min. read


Compliance and Regulations

Buried in rules: How to stay ahead of compliance

Buried in rules: How to stay ahead of compliance

Compliance and Regulations

Buried in rules: How to stay ahead of compliance

There’s a duality to compliance, wherein it is both a growing burden, but also an excellent opportunity.

Márk Szabó09 Feb 20266 min. read


Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Learn what this recognition means for organizations seeking reliable, scalable endpoint protection.

Márk Szabó and James Shepperd06 Feb 20264 min. read


Threat landscape

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Threat landscape

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Developments around renewable energy are moving fast. How can the sector ensure that cybersecurity keeps up in face of destructive attacks?

Márk Szabó and James Shepperd27 Jan 20268 min. read