top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
If you don’t look inside your environment, you can’t know its true state – and attackers count on that I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a marketing leader at ESET UK, part of my role is to communicate how our powerful and comprehensive solutions can be implemented to protect organisations, in a way that helps clarify the case for upgrading to higher levels of cybersecurity. And that need for clarity is
ESET Expert
1 day ago


Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience. Skip to the next paragraph if your eyes glaze over at the long, long titles of industry reports: the AV-Comparatives Endpoint Prevention and Response Comparative Report 2025, MITRE ATT&CK Evaluations Enterprise 2025, or the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Despite their wordy nomenclatur
ESET Expert
4 days ago


Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026
NOTE: The views and opinions expressed in this blog post are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation. The hidden treasure in the latest MITRE ATT&CK® Enterprise Evaluation is in the summaries and data deep-dives, not in headlines from vendors with high sales intent, under pressure to “sell” Detection & Response. As a result, even astute readers may miss the forest for the trees, seeing only individual performances and yet-t
ESET Expert
5 days ago


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. What do M&S and Co-op Group have in common? Aside from being among the UK’s most recognizable high street retailers, they were both recently the victims of a major ransomware breach. They were also both targeted by vishing attacks that elicited corporate passwords , providing their extorters with a critical foothold in the network. These identity-related breaches cost the two retailers over £
ESET Expert
Dec 9


How to keep train security on track
The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures. The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures. Trains are strategic elements of state infrastructure, especially in the U.S., which has the longest total rail network in the world. While mostly focused on freight , it provides around 167,000 jobs. A legacy of the industrial revolution, trains bring benefits
ESET Expert
Dec 3


The OSINT playbook: Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots Whatever the reason, we spend vast amounts of time online, tapping into the untold expanse of information, communication and resources. Sometimes, the challenge isn’t finding some data, but knowing what’s relevant, real and worth trusting. Anyone working with information needs to be able to cut through the noise and discern the au
ESET Expert
Nov 24


Why shadow AI could be your biggest security blind spot
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Shadow IT has long been a thorn in the side of corporate security teams. After all, you can’t manage or protect what you can’t see. But things could be about to get a lot worse. The scale, reach and power of artificial intelligence (AI) should make shadow AI a concern for any IT or security leader. Cyber risk thrives in the dark spaces between acceptable use po
ESET Expert
Nov 17
Tags
Newsletter
Follow us
Shop our products
bottom of page









