The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors.
Search results for: "zero trust"
How can organizations tackle the growing menace of attacks that shake trust in software?
Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.
Microsoft to fix zero‑day flaw that meant just previewing an Outlook email could infect your computer
It's one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment - but it's quite a different level of threat when simply *previewing* a message in your email client infects your computer.
The Race to Zero contest is being held during Defcon 16 at the Riviera Hotel in Las Vegas, 8-10 August 2008. The event involves contestants being given a sample set of viruses and malcode to modify and upload through the contest portal. The portal passes the modified samples through a number of antivirus engines and
Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?
Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose
URL shortener services distributing Android malware – Week in security with Tony Anscombe
How can organizations mitigate the risk of damaging cyberattacks while juggling the constantly changing mix of office and off-site workers?
A year into the pandemic, ESET reveals new research into activities of the LuckyMouse APT group and considers how governments can rise to the cybersecurity challenges of the accelerated shift to digital
And how would you know if the algorithm was tampered with?
Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations
Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.
ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim