category

Cybersecurity

The 10 Security Commandments for every SysAdmin

Celebrating the 17th annual SysAdmin Day, we recognize their dedication and workplace contributions and want to show appreciation for their talent.

5 highlights from the ‘Information Security Olympic Games’

In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.

APAC cybersecurity: Plenty of room for improvements

When it comes to APAC cybersecurity, there is room for improvement. In this feature we take a look at key trends across this region.

Analyzing Mr. Robot: S02E01

One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET’s Josep Albors.

Were you planning on downloading the Pokémon GO APK? Beware fake versions!

Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.

Hi, I’m the enemy: Different perspectives on a pentest

WeLiveSecurity begins a new series of articles showing the different angles that can be taken when tackling a pentest.

Stay cyber safe on the road: 10 tips for this summer season

If you are traveling this summer and taking your gadgets with you, this guide will ensure that you keep cyber safe when on the road.

Critical infrastructure: It’s time to make security a priority

The importance of ensuring information security on critical infrastructure has been recognized for years, yet there are still cases that illustrate the need for improvement.

Will we ever fix ‘broken’ USB stick security?

As a recent study finds that half of people plug in USB sticks found at their work’s car parking lot, we ask if the USB security threat will ever go away.

Expect the unexpected: The importance of audit logging

ESET’s Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.

After authentication comes authorization and access control

In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET’s Lysa Myers.

Authentication 101

Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are, says ESET’s Lysa Myers.

Say goodbye to cyber stresses in the workplace

On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.

The perimeter is everywhere (so where is your data really?)

It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET’s Cameron Camp looks explores the challenges of data security.

Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing

How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.

The family security checklist

Keeping your family safe online is not about making a one-off investment in a security solution. It requires a proactive approach, once every two to three months for example, where you tick off a checklist. Here are five things to keep on top of.

RSA: Will your next phone have quantum cryptographic 2FA?

Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be ‘yes’ says ESET’s Cameron Camp.

Security is ‘easy’: Just ask someone at RSA

This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.

Managing agile virtual machine security across the enterprise: A closer look

It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET’s Cameron Camp.

RSA: Can crypto save your life?

Is there such a thing as security technology that is too good? ESET’s Cameron Camp, who is in attendance at RSA, discusses further.

Follow us

Copyright © 2016 ESET, All Rights Reserved.