Stay ahead of digital threats with insights from a cybersecurity leader
Roman Cuprik • 09 Apr 2026 • 11 min. read
Threat landscape
What are EDR killers? How ransomware attacks disable EDR and how to stop it
Roman Cuprik • 31 Mar 2026 • 9 min. read
Cloud and Application Security
Phishing is now more dangerous than ever. Businesses need new tools.
Roman Cuprik • 24 Mar 2026 • 8 min. read
Threat Intelligence
Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports
Why threat intelligence is at the heart of security integration
Prevention and Awareness
How to take legacy operational technology (OT) risks in manufacturing head-on
Identity and Data Protection
Zero Trust model explained: Why “never trust, always verify” matters more than ever
This article breaks down what Zero Trust means in 2026, how it has evolved, and why adoption has become an urgent strategic priority.
Jakub Filip • 13 Apr 2026
A practical guide to EDR killers and the tactics ransomware groups use to blind endpoint defenses.
Roman Cuprik • 09 Apr 2026
Why zero trust is critical for healthcare cybersecurity
Despite pressure from regulators and diligent efforts to bolster cybersecurity, attacks are common and healthcare organizations remain at substantial risk.
Márk Szabó and Jakub Filip • 07 Apr 2026
Compliance and Regulations
What Common Criteria Certification means for ESET Endpoint Security
When it comes to IT security technologies, independent tests and certifications help decision-makers assess solutions and evaluate their performance.
André Lameiras • 02 Apr 2026
Do you know how to bridge the gap between legacy risks and modern security needs?
Márk Szabó • 01 Apr 2026
Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.
Márk Szabó • 25 Mar 2026
Cloud and Application Security, Compliance and Regulations
In the crosshairs: Securing cloud workloads with bespoke solutions
With regulations like DORA, third-party risk gains new consequences.
Márk Szabó • 23 Mar 2026
Too big to ignore? The security crisis brewing in AI agent platforms
What we found after scanning 60 thousand skills for AI agents, and how to put guardrails in place.
ESET Research • 20 Mar 2026
Strong enough to lead: Navigating resilience in IT Security
What is core-code for leadership in IT security? Investing in resilience and trust.
Viktória Ivanová • 16 Mar 2026
Sign up for our newsletters
Thank you! Please check your email and confirm your subscription.