CYBERSECURITY TRENDS 2019: Privacy and Intrusion in the Global Village

December 29, 2018

For several years now, ESET experts from around the world have been contributing to our annual Trends report, which offers a brief review of the milestones reached in the world of cybersecurity and our predictions about possible attack scenarios and measures to counteract them in 2019. The basic scenarios regarding these issues vary little: it comes down to defending the confidentiality, integrity, and availability of data belonging to individuals and companies against repeated attacks by cybercriminals who try to access, use, and/or steal these data. For these reasons, in the 2019 edition of the Trends report you will find a section focusing on data privacy and the rising importance for businesses to manage data privacy correctly, especially in light of the Facebook/Cambridge Analytica controversy, as well as the Google breach and subsequent decision to shut down Google+.

Spotlight

Oasis Technology, Inc.

Since 1979, Oasis’ clients have benefited from the company’s in-depth knowledge and breadth of experience that comes from having 60 technology experts on staff. We don’t have sales people. Our clients talk to local, knowledgeable help desk and support technicians who combine clear communication and interpersonal skills with top notch IT skills and knowledge.

OTHER WHITEPAPERS
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

Quantum Readiness Toolkit: Building a Quantum-Secure Economy

whitePaper | June 29, 2023

Accelerating developments in quantum computing pose new challenges to cybersecurity. The rise of quantum computers has the potential to compromise existing cryptographic systems, putting secure communications and data protection at risk. Organizations must adjust security practices and governance to address the quantum threat.

Read More
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More
news image

Security Whitepaper 2023

whitePaper | July 18, 2023

Statype asks a lot from our customers: we ingest sensitive financial, performance, and customer information to generate deep insights. Our customers trust us to get this right because security is a core tenant of everything we build, and we prioritize getting security right

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More

Spotlight

Oasis Technology, Inc.

Since 1979, Oasis’ clients have benefited from the company’s in-depth knowledge and breadth of experience that comes from having 60 technology experts on staff. We don’t have sales people. Our clients talk to local, knowledgeable help desk and support technicians who combine clear communication and interpersonal skills with top notch IT skills and knowledge.

Events