We all know our data should be protected. And it’s obvious that one such protection method—the ability to quickly restore data from a backup method—should be a high priority. But backing up data…
In the last few years, it is hard to talk about computer security without the word “Cryptowall” being brought up. In February, Hollywood Presbyterian Medical Center was hit by this strain of…
With the launch of ESET Virtualization Security, ESET now offers an agentless approach to securing your virtual environments in addition to our agent-based solution. Both provide powerful protection,…
When ESET asked researchers at the highly respected Ponemon Institute to survey healthcare organizations, I suspected the results would be troubling. Today in the U.S., a growing cybercrime wave seeks…
Encryption has become an increasingly hot topic in the last few months—most recently, with Apple’s refusal to help the FBI unlock an iPhone that belonged to one of the shooters in the San Bernardino…
Here’s a situation that will sound familiar to any woman working in cybersecurity: You’re at a conference. You look around the room. Of the hundreds of attendees, you realize you’re one of the only…