Business security


302 articles

Cyber insurance as part of the cyber threat mitigation strategy

Cyber insurance as part of the cyber threat mitigation strategy

Cyber insurance as part of the cyber threat mitigation strategy

Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies

Tony Anscombe26 Jun 2024


Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat

Phil Muncaster19 Jun 2024


Preventative defense tactics in the real world

Preventative defense tactics in the real world

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack

Cameron Camp17 Jun 2024


Untangling the hiring dilemma: How security solutions free up HR processes

Untangling the hiring dilemma: How security solutions free up HR processes

Untangling the hiring dilemma: How security solutions free up HR processes

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?

Márk Szabó21 May 2024


ESET APT Activity Report Q4 2023–Q1 2024

ESET APT Activity Report Q4 2023–Q1 2024

ESET APT Activity Report Q4 2023–Q1 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024

Jean-Ian Boutin14 May 2024


MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprise-grade security

Márk Szabó30 Apr 2024


Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?

Phil Muncaster12 Mar 2024


Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

David González Cuautle29 Feb 2024


Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk

Márk Szabó28 Feb 2024