Phil Muncaster, the guest writer at ESET, probes whether that is the right question to ask and suggests what else you should consider when it comes to keeping your accounts safe.
Sonia Domínguez Waisbrod, the writer at ESET explains here what drives cybercriminals to relentlessly target the personal information of other people and why you need to guard your data like your life depends on it.
Márk Szabó, PR and Security Writer at ESET explains that as adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk.
Márk Szabó, PR and Security Writer, ESET explains that recently, the YouTube channel stacksmashing uploaded a video on breaking the built-in encryption in Windows, essentially bypassing Windows Disk Encryption on most devices using Microsoft’s globally dominant operating system with a cheap $10 tool.
Lucas Paus and Mario Micucci, the Security Researchers at ESET explain how to learn the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell
Phil Muncaster, guest writer at ESET talks about the heavy workloads and the spectre of personal liability for incidents that take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?
Emily Hancock, Data Privacy Officer at Cloudflare explains that while creating any data security plan organisations must focus on data privacy to safeguard the personal data of their customers and employees
Sagar Patel, Director Analyst at Gartner discusses the importance of Identity governance and administration to improve the identity and access management process and reduce risks of unauthorized access.
Roman Cuprik, Content Writer, ESET, explains that amidst increased obfuscation of multistage malware attacks, MSPs need an effective way to secure cloud communication while avoiding the need for multiple unique network connection authorizations.
Alžbeta Kovaľová, writer at ESET, discusses whether DNS protection technology can transform consumers’ worries about cybercrime with a trust-based approach.