Business security


321 articles

Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company

Phil Muncaster11 Nov 2025


ESET APT Activity Report Q2 2025–Q3 2025

ESET APT Activity Report Q2 2025–Q3 2025

ESET APT Activity Report Q2 2025–Q3 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025

Jean-Ian Boutin06 Nov 2025


Ground zero: 5 things to do after discovering a cyberattack

Ground zero: 5 things to do after discovering a cyberattack

Ground zero: 5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between disruption and disaster

Phil Muncaster03 Nov 2025


Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms

Phil Muncaster28 Oct 2025


How MDR can give MSPs the edge in a competitive market

How MDR can give MSPs the edge in a competitive market

How MDR can give MSPs the edge in a competitive market

With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs

Phil Muncaster27 Oct 2025


IT service desks: The security blind spot that may put your business at risk

IT service desks: The security blind spot that may put your business at risk

IT service desks: The security blind spot that may put your business at risk

Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.

Phil Muncaster15 Oct 2025


The case for cybersecurity: Why successful businesses are built on protection

The case for cybersecurity: Why successful businesses are built on protection

The case for cybersecurity: Why successful businesses are built on protection

Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center

Phil Muncaster07 Oct 2025


Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging

Phil Muncaster03 Oct 2025


Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises

Phil Muncaster18 Sep 2025