Award-winning news, views, and insight from the ESET security community
Tony Anscombe • 26 Jun 2024 • 5 min. read
Business Security
Cyber insurance as part of the cyber threat mitigation strategy
Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies
Tony Anscombe • 26 Jun 2024
Critical Infrastructure
Hacktivism is evolving – and that could be bad news for organizations everywhere
Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat
Phil Muncaster • 19 Jun 2024
Preventative defense tactics in the real world
Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack
Cameron Camp • 17 Jun 2024
Untangling the hiring dilemma: How security solutions free up HR processes
The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?
Márk Szabó • 21 May 2024
ESET Research
Threat Reports
ESET APT Activity Report Q4 2023–Q1 2024
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024
Jean-Ian Boutin • 14 May 2024
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprise-grade security
Márk Szabó • 30 Apr 2024
Election cybersecurity: Protecting the ballot box and building trust in election integrity
What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?
Phil Muncaster • 12 Mar 2024
Secure Coding
Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor
David González Cuautle • 29 Feb 2024
Vulnerabilities in business VPNs under the spotlight
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
Márk Szabó • 28 Feb 2024