Blog Posts

Comprehensive collection of ESET Blog Posts, including the highest performing Press Releases, Research and Thought Leadership content gathered on single page.

Latest Blog Posts

Quantum Computing and its Impact On Cybersecurity: What You Need to Know

By understanding the basics of quantum computing and how it relates to the future of cybersecurity, you can understand the potential risks, take preventative steps for information security, and see…

From Smartphones to Smart Homes: Extending Mobile Security to IoT Devices

The ever expanding Internet of Things (IoT) ecosystem is changing how we interact with technology in our daily lives. From smart security systems and televisions to intelligent refrigerators and…

Strengthening Cybersecurity with Continuous Threat Exposure Management

Organisations are proactively combating the rise of increasingly sophisticated and ever-evolving cyber risks by taking advantage of Continuous Threat Exposure Management (CTEM) programs to ensure the…

Understanding Mobile Security: The Basics of Biometric Authentication

Biometric authentication is a powerful tool in mobile security. It has revolutionised the way we protect our devices and sensitive information and made it easier and more convenient to use our phones…

Latest Press Releases

From Garage to Cybersecurity Titan: ESET Southern Africa Celebrates its 20-Year Journey in Shaping the Digital Landscape

This year, ESET Southern Africa celebrates 20 years of leading the cybersecurity industry in South Africa, offering product solutions to businesses of all sizes, whether consumer or enterprise. Since…

Beware of Tax Season Scammers

At their core, tax scams, and indeed many online scams, rely on some form of social engineering. “Scammers contact you via email or SMS and are quite deliberate in creating a sense of urgency to…

Data Breaches and Their Fallout For South African Enterprises and Consumers

Data breaches are a chronic and growing menace for South African enterprises and consumers. Interconnected systems mean data breaches have become widespread threats, affecting millions. As businesses…

AI's Double-Edged Sword Requires a Human Security Approach

The double-edged generative AI (gen AI) sword can be used by malicious actors to craft sophisticated phishing emails, spam, and disinformation campaigns, amplifying the scale and effectiveness of…

Follow ESET on Social Media