Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors. Find out more in this ESET-sponsored blog.
How can organizations tackle the growing menace of attacks that shake trust in software? Cameron Camp and Tony Anscombe of ESET tackle this supply chain challenge.
March 23, 2021ESET Guest BlogComments Off on What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?
Before ESET shined the light on a slew of APT groups exploiting vulnerabilities in Exchange servers around the world, a smaller number were using zero days in targeted attacks—leading CISOs to reconsider their security approach.
Some perpetrators of online crime and fraud don’t use advanced methods to profit at the expense of unsuspecting victims and to avoid getting caught, ESET’s Jake Moore explains
This year, many of us will be celebrating Christmas with our loved ones virtually, however we shouldn’t underestimate the value of securing our online communication
It’s been a year full of surprises, but the increase in variety and ferocity of attacks on security online shouldn’t be one of them. ESET offers some thoughts on the security trends to keep an eye on as we head into 2021.