Is cybersecurity now as important as health and safety?

World Day for Safety and Health at Work takes place on April 28th 2017. You should use this as an opportunity to improve your cybersecurity posture.

Hack the US Air Force, and make cash… legally!

Humans make mistakes, and vulnerabilities can creep into projects unspotted. The more trusted eyes checking a service – with the approval of the systems’ owners – the better.

Machine learning and math can’t trump smart attackers

Machine learning alone is not enough to protect endpoints and predicting an attacker’s next moves. Other security solutions and human input are needed.

When PR and reality collide: The truth about machine learning in cybersecurity

Machine learning (ML) is routinely cited by post-truth vendors as their biggest selling point, their main advantage. But ML – if it’s done properly – comes with problems and limitations.

Women in cybersecurity: Slowly but surely, change is coming

Only 11% of positions in the global cybersecurity workforce are occupied by women. We take a look at why and what is being done to change this.

10 ways to prepare your organization for GDPR

GDPR is coming into play in May 2018, but a lot of companies remain unprepared, which could have implications on how they process data.

Don’t buy the elixir of youth: Machine learning is not magic

There is no magic in machine learning. It’s a field of computer science that gives computers the ability to find patterns in huge amounts of data.

Fighting post-truth with reality in cybersecurity

Welcome to the beginning of a new series of short articles focused on the currents state of AI, all the ins and outs of machine learning, and how it affects cybersecurity.

Ghost in the Shell: Fantasy meets reality with cybersecurity themes

With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.

The economics of cybersecurity for the undecided

How do you calculate the value at risk? Choosing between investing in antivirus software or doing nothing to prevent cybercrime is not black and white. We explore the grey areas of cybersecurity economics.

Challenges and implications of cybersecurity legislation

Cybersecurity legislation: organization, collaboration and diffusion across the globe, and working towards the populization of cybersecurity culture

Ways in which to plug the infosec talent gap

ESET’s Lysa Myers looks at the shortage of qualified information security talent to fill positions, discussing ways in which to plug the infosec talent gap.

10 ways to ruin a cybercriminal’s day

Technology is affecting our relationships and changing our lives, but are we taking the necessary measures to protect ourselves online? Here’s how to outsmart cybercriminals.

IoT of toys stranger than fiction: Cybersecurity and data privacy update

The Internet of Stranger Things came to life in the recent case of a cuddly connected toy, raising wider and deeper questions about cybersecurity, privacy, and the future of digital technology.

Bletchley Park: Training the next generation of cybersecurity codebreakers

Bletchley Park, considered to be the birthplace of modern computing, is to train the generation of cybersecurity codebreakers.

RSA – day 3: Security for those who don’t know what that means

Here at RSA, an increasing amount of security purchases are made by those who got the task dumped in their laps, but who have little or no formal or practical training.

RSA 2017 – day 2: Attacking yourself

Want to find holes in your security perimeter? What better way than to attempt to attack yourself, and here at RSA there are plenty of tools to help.

RSA 2017: The year the little guys get swallowed up

RSA feels like a mashup of giant tech Titans steadily swallowing up the little guys to make one massive, unholy tech monster. But how does that really work for small businesses as customers, and the rest of us?

Proof-of-concept ransomware to poison the water supply

Researchers have described how ransomware could potentially attack industrial control systems (ICS), and demonstratied how new malware threats might target core infrastructure, holding entire cities hostage.

Next-gen security software: Myths and marketing

There is a view in the media of the current security market that assumes a split between first-generation and technologies using next-generation signature-less detection.

Follow us

Copyright © 2017 ESET, All Rights Reserved.