Business security


170 articles

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Phil Muncaster30 Nov 2023


Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

Phil Muncaster28 Nov 2023


Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills

Christian Ali Bravo13 Nov 2023


Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk

Phil Muncaster10 Nov 2023


Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technology’s business value

Phil Muncaster06 Nov 2023


ESET APT Activity Report Q2–Q3 2023

ESET APT Activity Report Q2–Q3 2023

ESET APT Activity Report Q2–Q3 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023

Jean-Ian Boutin26 Oct 2023


Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats

Phil Muncaster19 Oct 2023


Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

How robust backup practices can help drive resilience and improve cyber-hygiene in your company

Phil Muncaster18 Oct 2023


6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives

Phil Muncaster11 Oct 2023