Future-proofing PC fleets with the powerful pairing of Intel® Threat Detection Technology and AI-Native endpoint protection

Everyone enjoys a PC refresh – Processor performance joined by security as an important factor. The continued shift to hybrid work (and play) marked a significant departure from pandemic norms. While health protocols reverted, the digital realm saw enduring changes. Amidst this transformation, security has emerged as a crucial but often overlooked aspect of personal … More Future-proofing PC fleets with the powerful pairing of Intel® Threat Detection Technology and AI-Native endpoint protection

AI hype overload

Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. Predictably, this year’s RSA Conference is buzzing with the promise of artificial intelligence – not unlike last year, after all. Go see if you can find a booth that doesn’t mention AI – we’ll … More AI hype overload

ESET included among notable vendors in Mobile Threat Defense Solutions Landscape report

ESET, a global leader in cybersecurity solutions, has been included in Forrester’s Mobile Threat Defense (MTD) Solutions Landscape report, Q1 2024. Forrester, a respected analyst firm, provides an overview of 16 vendors in the field, including ESET, which, in our opinion, makes ESET a valuable player in this established market. The importance of mobile malware … More ESET included among notable vendors in Mobile Threat Defense Solutions Landscape report

Reducing the complexity of security tasks with the involvement of AI

Practical design considerations implemented in key functionalities of cybersecurity solutions can go a long way toward increasing the impact of in-house security, while also reducing the sometimes-necessary complexity of their use. However, processing actionable data, be it detections or threat intelligence, is also complex and takes considerable capacity, manpower, and maturity. At the same time, … More Reducing the complexity of security tasks with the involvement of AI

The hacker’s toolkit: 4 gadgets that could spell security trouble

Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands? Can seemingly innocuous objects that feign the appearance of regular USB sticks, charging cables or children’s toys be co-opted as tools to aid and abet … More The hacker’s toolkit: 4 gadgets that could spell security trouble