Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are, says ESET's Lysa Myers.
On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.
It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET's Cameron Camp looks explores the challenges of data security.
How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.
Keeping your family safe online is not about making a one-off investment in a security solution. It requires a proactive approach, once every two to three months for example, where you tick off a checklist. Here are five things to keep on top of.
Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be 'yes' says ESET's Cameron Camp.
This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.
It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET's Cameron Camp.
Is there such a thing as security technology that is too good? ESET's Cameron Camp, who is in attendance at RSA, discusses further.
Whenever there is information that needs to be protected, there is a need to use cryptographic solutions. POS applications are no exception explains ESET's Lucas Paus.
Before you jump into the virtualization migration process, there are a few things to consider, like security, explains ESET's Miguel Angel Mendoza.
It’s that time of the year when the information security industry takes part in its annual tradition: coming up with cybercrime predictions and trends for the next 12 months.
If you are looking to boost your cybersecurity prowess, then make some time for the first Star Wars film, A New Hope. You'd be surprised at what this hugely popular and successful movie has to offer.
Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.
Test your device security nous with our festive-inspired wordsearch. By the end of it, we reckon you'll have a solid grasp of what's required this Christmas.
Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.
The demand for cyber experts is at a record high, with more firms eager to secure the services of experts to ensure they are safe from attacks. And they’re willing to pay top dollar.
At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.
If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET's Cameron Camp.
According to a new survey from ESET, the Europeans are leading the way with the online payment methods. Americans meanwhile prefer traditional alternatives.