Business security


400 articles

Supply chain dependencies: Have you checked your blind spot?

Supply chain dependencies: Have you checked your blind spot?

Supply chain dependencies: Have you checked your blind spot?

Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?

Tony Anscombe16 Apr 2026


As breakout time accelerates, prevention-first cybersecurity takes center stage

As breakout time accelerates, prevention-first cybersecurity takes center stage

As breakout time accelerates, prevention-first cybersecurity takes center stage

Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.

Phil Muncaster07 Apr 2026


A cunning predator: How Silver Fox preys on Japanese firms this tax season

A cunning predator: How Silver Fox preys on Japanese firms this tax season

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them

Dominik Breitenbacher and Takahiro Sajima27 Mar 2026


Virtual machines, virtually everywhere – and with real security gaps

Virtual machines, virtually everywhere – and with real security gaps

Virtual machines, virtually everywhere – and with real security gaps

Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves

Tomáš Foltýn25 Mar 2026


Cloud workload security: Mind the gaps

Cloud workload security: Mind the gaps

Cloud workload security: Mind the gaps

As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning

Tomáš Foltýn24 Mar 2026


Cyber fallout from the Iran war: What to have on your radar

Cyber fallout from the Iran war: What to have on your radar

Cyber fallout from the Iran war: What to have on your radar

The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.

Tomáš Foltýn12 Mar 2026


What cybersecurity actually does for your business

What cybersecurity actually does for your business

What cybersecurity actually does for your business

The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed

Tomáš Foltýn06 Mar 2026


How SMBs use threat research and MDR to build a defensive edge

How SMBs use threat research and MDR to build a defensive edge

How SMBs use threat research and MDR to build a defensive edge

We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses

Ben Tudor05 Mar 2026


Protecting education: How MDR can tip the balance in favor of schools

Protecting education: How MDR can tip the balance in favor of schools

Protecting education: How MDR can tip the balance in favor of schools

The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?

Phil Muncaster04 Mar 2026