Latest Articles

Identity and Data Protection

Zero Trust model explained: Why “never trust, always verify” matters more than ever

Zero Trust model explained: Why “never trust, always verify” matters more than ever

Identity and Data Protection

Zero Trust model explained: Why “never trust, always verify” matters more than ever

This article breaks down what Zero Trust means in 2026, how it has evolved, and why adoption has become an urgent strategic priority.

Jakub Filip13 Apr 2026


Threat landscape

What are EDR killers? How ransomware attacks disable EDR and how to stop it

What are EDR killers? How ransomware attacks disable EDR and how to stop it

Threat landscape

What are EDR killers? How ransomware attacks disable EDR and how to stop it

A practical guide to EDR killers and the tactics ransomware groups use to blind endpoint defenses.

Roman Cuprik09 Apr 2026


Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Why zero trust is critical for healthcare cybersecurity

Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Despite pressure from regulators and diligent efforts to bolster cybersecurity, attacks are common and healthcare organizations remain at substantial risk.

Márk Szabó and Jakub Filip07 Apr 2026


Compliance and Regulations

What Common Criteria Certification means for ESET Endpoint Security

What Common Criteria Certification means for ESET Endpoint Security

Compliance and Regulations

What Common Criteria Certification means for ESET Endpoint Security

When it comes to IT security technologies, independent tests and certifications help decision-makers assess solutions and evaluate their performance.

André Lameiras02 Apr 2026


Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

How to take legacy operational technology (OT) risks in manufacturing head-on

Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

Do you know how to bridge the gap between legacy risks and modern security needs?

Márk Szabó01 Apr 2026


Threat landscape

Why threat intelligence is at the heart of security integration

Why threat intelligence is at the heart of security integration

Threat landscape

Why threat intelligence is at the heart of security integration

Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.

Márk Szabó25 Mar 2026


Cloud and Application Security, Compliance and Regulations

In the crosshairs: Securing cloud workloads with bespoke solutions

In the crosshairs: Securing cloud workloads with bespoke solutions

Cloud and Application Security, Compliance and Regulations

In the crosshairs: Securing cloud workloads with bespoke solutions

With regulations like DORA, third-party risk gains new consequences.

Márk Szabó23 Mar 2026


Threat landscape

Too big to ignore? The security crisis brewing in AI agent platforms

Too big to ignore? The security crisis brewing in AI agent platforms

Threat landscape

Too big to ignore? The security crisis brewing in AI agent platforms

What we found after scanning 60 thousand skills for AI agents, and how to put guardrails in place.

ESET Research20 Mar 2026


Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

Strong enough to lead: Navigating resilience in IT Security

Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

What is core-code for leadership in IT security? Investing in resilience and trust.

Viktória Ivanová16 Mar 2026


Prevention first cybersecurity as a service
ESET Resource Center for Business
Your reliable source of educative and enriching digital content