Business security


303 articles

ESET Threat Report H2 2023

ESET Threat Report H2 2023

ESET Threat Report H2 2023

A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč19 Dec 2023


Delivering trust with DNS security

Delivering trust with DNS security

Delivering trust with DNS security

Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?

Alžbeta Kovaľová13 Dec 2023


Black Hat Europe 2023: The past could return to haunt you

Black Hat Europe 2023: The past could return to haunt you

Black Hat Europe 2023: The past could return to haunt you

Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.

Tony Anscombe08 Dec 2023


Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Phil Muncaster30 Nov 2023


Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

Phil Muncaster28 Nov 2023


Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk

Phil Muncaster10 Nov 2023


Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technology’s business value

Phil Muncaster06 Nov 2023


ESET APT Activity Report Q2–Q3 2023

ESET APT Activity Report Q2–Q3 2023

ESET APT Activity Report Q2–Q3 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023

Jean-Ian Boutin26 Oct 2023


Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats

Phil Muncaster19 Oct 2023