Business security


390 articles

Under lock and key: Safeguarding business data with encryption

Under lock and key: Safeguarding business data with encryption

Under lock and key: Safeguarding business data with encryption

As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose

Phil Muncaster05 Sep 2025


The need for speed: Why organizations are turning to rapid, trustworthy MDR

The need for speed: Why organizations are turning to rapid, trustworthy MDR

The need for speed: Why organizations are turning to rapid, trustworthy MDR

How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries

Phil Muncaster19 Aug 2025


Supply-chain dependencies: Check your resilience blind spot

Supply-chain dependencies: Check your resilience blind spot

Supply-chain dependencies: Check your resilience blind spot

Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?

Tony Anscombe12 Aug 2025


Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

A sky-high premium may not always reflect your company’s security posture

Tony Anscombe08 Aug 2025


Black Hat USA 2025: Policy compliance and the myth of the silver bullet

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?

Tony Anscombe07 Aug 2025


Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes

Tony Anscombe07 Aug 2025


How government cyber cuts will affect you and your business

How government cyber cuts will affect you and your business

How government cyber cuts will affect you and your business

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks

Tony Anscombe03 Jul 2025


ESET Threat Report H1 2025

ESET Threat Report H1 2025

ESET Threat Report H1 2025

A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč26 Jun 2025


ESET APT Activity Report Q4 2024–Q1 2025

ESET APT Activity Report Q4 2024–Q1 2025

ESET APT Activity Report Q4 2024–Q1 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025

Jean-Ian Boutin19 May 2025