Business security


277 articles

ESET Research, Threat Reports

ESET Threat Report H1 2024

ESET Threat Report H1 2024

ESET Research, Threat Reports

ESET Threat Report H1 2024

A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč27 Jun 2024


Business Security

Cyber insurance as part of the cyber threat mitigation strategy

Cyber insurance as part of the cyber threat mitigation strategy

Business Security

Cyber insurance as part of the cyber threat mitigation strategy

Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies

Tony Anscombe26 Jun 2024


Business Security, Critical Infrastructure

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is evolving – and that could be bad news for organizations everywhere

Business Security, Critical Infrastructure

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat

Phil Muncaster19 Jun 2024


Business Security

Preventative defense tactics in the real world

Preventative defense tactics in the real world

Business Security

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack

Cameron Camp17 Jun 2024


Business Security

Untangling the hiring dilemma: How security solutions free up HR processes

Untangling the hiring dilemma: How security solutions free up HR processes

Business Security

Untangling the hiring dilemma: How security solutions free up HR processes

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?

Márk Szabó21 May 2024


ESET Research, Threat Reports

ESET APT Activity Report Q4 2023–Q1 2024

ESET APT Activity Report Q4 2023–Q1 2024

ESET Research, Threat Reports

ESET APT Activity Report Q4 2023–Q1 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024

Jean-Ian Boutin14 May 2024


Business Security

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

Business Security

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprise-grade security

Márk Szabó30 Apr 2024


Critical Infrastructure

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure

Election cybersecurity: Protecting the ballot box and building trust in election integrity

What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?

Phil Muncaster12 Mar 2024


Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

David González Cuautle29 Feb 2024