Business security


390 articles

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Tony Anscombe12 Dec 2025


Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims

Tony Anscombe11 Dec 2025


Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

If you don’t look inside your environment, you can’t know its true state – and attackers count on that

Steven Connolly11 Dec 2025


Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 2025


The big catch: How whaling attacks target top executives

The big catch: How whaling attacks target top executives

The big catch: How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.

Phil Muncaster09 Dec 2025


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs.

Phil Muncaster04 Dec 2025


MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

Why your business needs the best-of-breed combination of technology and human expertise

Steven Connolly24 Nov 2025


Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company

Phil Muncaster11 Nov 2025


ESET APT Activity Report Q2 2025–Q3 2025

ESET APT Activity Report Q2 2025–Q3 2025

ESET APT Activity Report Q2 2025–Q3 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025

Jean-Ian Boutin06 Nov 2025