From incident to resolution: Essential steps to survive a cyberattack

Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in your network can create event logs that rapidly grow to almost unimaginable mountains of data to be … More From incident to resolution: Essential steps to survive a cyberattack

The ABCs of Anti-Phishing and Web Access Protection

Homoglyph attacks: high-value targets are protected by ESET The Cypriot security watchdog, CSIRT, warns about a fake PayPal site that spreads the Nemty ransomware using a so-called homoglyph attack. Homoglyph attacks rely on replacing characters in addresses with ones that look similar – or even optically identical – but are actually different, as they belong to different … More The ABCs of Anti-Phishing and Web Access Protection

Challenges and implications of cybersecurity legislation

Technology has had an impact on nearly every aspect of society, and will continue to do so in the coming years. Many of today’s activities are increasingly dependent on information systems, electronic devices, and data networks – a trend which is leading to hyperconnectivity. At the same time, we are seeing new threats and vulnerabilities … More Challenges and implications of cybersecurity legislation