5 key aspects for safe virtualization
Camilo Gutierrez Amaya looks at five key aspects for aspects that companies should be taken into consideration when developing a virtualization project.
Camilo Gutierrez Amaya looks at five key aspects for aspects that companies should be taken into consideration when developing a virtualization project.
The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.
The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.
In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.
A Texas university is to research cybersecurity solutions to vulnerabilities in medical devices, boosted by a major grant from the National Science Foundation.
Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?
Are you working on a new application? If so, consider these three recommendations that highlight the importance of thinking about information security.
Staying safe and protected online as an enterprise is growing in importance and recognition. We look at whether business security needs to be simpler?
ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit of insurer breaches.
Your work is important to you, your employer and cybercriminals as well. That is a good reason to stop and think before you connect.
Ahead of next week's Virus Bulletin conference, ESET's Lysa Myers offers a teaser of what to expect of her "small talk" with colleague Stephen Cobb.
There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.
One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s look at what that phrase entails.
The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.
APTs - or Advanced Persistent Threats - are the most menacing cyber attack there is, some say. Built to be stealthy, they penetrate networks, steal secrets - and vanish. 'Catching' one was a little like finding Bigfoot - but the much-hyped threat wasn't quite so scary up close...
Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks - but there aren’t enough experts to go round.
A new cyber defense force is being set up in the UK to protect critical private and government computer networks from attack - “if necessary, to strike in cyberspace,” Britain’s Defense Secretary Philip Hammond has said.
NASA is no stranger to peering into nebulae in space - but the space agency found itself perplexed by the more Earthbound puzzle of cloud computing security, according to a report by the Office of the Inspector General.
President Obama has used a TV interview to further raise public awareness of the growing cyber security threat against the United States.
The winner of the 2103 UK Cyber Security Challenge, launched two years ago as part of a government and industry backed initiative to encourage people to choose a career in information security, has been announced.