• How to secure your device in one step

    Oftentimes, we talk about the need to be good role models to our children, limiting their technology use and time spent in front of a screen. But what about us? We may want to protect our children,…

  • Enhancing ESET’s MSP program with detection and response

    ESET’s managed service provider (MSP) program now offers ESET Inspect. For those unfamiliar with this technology, ESET Inspect enhances an organization’s security defenses with robust detection and…

  • Strong ARM tactics to keep your clients safe

    The 64-bit evolution of the ARM architecture family — the efficient and light ARM64 processor — is predicted to become increasingly adopted by businesses. Whatever the use case for adopting ARM-based…

  • Introducing ESET NetProtect: Fighting threats at the DNS level

    The DNS, the internet’s address book, has long been plagued by malicious domains with little hope for effective recourse against this abuse by its bookkeepers: the registrars. ESET brings its…

  • Becoming a Hero of Progress

    Post-Russia unleashing its attack on Ukraine, there’s a high chance that if you’re working in the cybersecurity sector as I am, you’re being asked a series of questions like: Do you think Russia will…

  • Protecting small businesses with multiple layers of defense

    Post-Russia unleashing its attack on Ukraine, there’s a high chance that if you’re working in the cybersecurity sector as I am, you’re being asked a series of questions like: Do you think Russia will…