Business security


288 articles

Business Security

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Business Security

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 2024


Business Security

The 7 deadly cloud security sins – and how SMBs can do things better

The 7 deadly cloud security sins – and how SMBs can do things better

Business Security

The 7 deadly cloud security sins – and how SMBs can do things better

By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk

Phil Muncaster16 Jan 2024


Business Security

A peek behind the curtain: How are sock puppet accounts used in OSINT?

A peek behind the curtain: How are sock puppet accounts used in OSINT?

Business Security

A peek behind the curtain: How are sock puppet accounts used in OSINT?

How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks

Mario Micucci11 Jan 2024


ESET Research, Threat Reports

ESET Threat Report H2 2023

ESET Threat Report H2 2023

ESET Research, Threat Reports

ESET Threat Report H2 2023

A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč19 Dec 2023


Business Security, Digital Security

Delivering trust with DNS security

Delivering trust with DNS security

Business Security, Digital Security

Delivering trust with DNS security

Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?

Alžbeta Kovaľová13 Dec 2023


Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Black Hat Europe 2023: The past could return to haunt you

Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.

Tony Anscombe08 Dec 2023


Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Phil Muncaster30 Nov 2023


Business Security

Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

Business Security

Retail at risk: Top threats facing retailers this holiday season

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

Phil Muncaster28 Nov 2023


Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk

Phil Muncaster10 Nov 2023