Business security


299 articles

When IT meets OT: Cybersecurity for the physical world

When IT meets OT: Cybersecurity for the physical world

When IT meets OT: Cybersecurity for the physical world

While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat

Phil Muncaster14 Mar 2025


AI-driven deception: A new face of corporate fraud

AI-driven deception: A new face of corporate fraud

AI-driven deception: A new face of corporate fraud

Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses

Phil Muncaster10 Mar 2025


Patch or perish: How organizations can master vulnerability management

Patch or perish: How organizations can master vulnerability management

Patch or perish: How organizations can master vulnerability management

Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching

Phil Muncaster05 Feb 2025


Untrustworthy AI: How to deal with data poisoning

Untrustworthy AI: How to deal with data poisoning

Untrustworthy AI: How to deal with data poisoning

You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so

Márk Szabó30 Jan 2025


The evolving landscape of data privacy: Key trends to shape 2025

The evolving landscape of data privacy: Key trends to shape 2025

The evolving landscape of data privacy: Key trends to shape 2025

Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams

Phil Muncaster23 Jan 2025


Under lock and key: Protecting corporate data from cyberthreats in 2025

Under lock and key: Protecting corporate data from cyberthreats in 2025

Under lock and key: Protecting corporate data from cyberthreats in 2025

Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage

Phil Muncaster21 Jan 2025


State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats

Phil Muncaster07 Jan 2025


Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year

Phil Muncaster18 Dec 2024


ESET Threat Report H2 2024

ESET Threat Report H2 2024

ESET Threat Report H2 2024

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč16 Dec 2024