CYBERSECURITY TRENDS 2019: Privacy and Intrusion in the Global Village

December 29, 2018

For several years now, ESET experts from around the world have been contributing to our annual Trends report, which offers a brief review of the milestones reached in the world of cybersecurity and our predictions about possible attack scenarios and measures to counteract them in 2019. The basic scenarios regarding these issues vary little: it comes down to defending the confidentiality, integrity, and availability of data belonging to individuals and companies against repeated attacks by cybercriminals who try to access, use, and/or steal these data. For these reasons, in the 2019 edition of the Trends report you will find a section focusing on data privacy and the rising importance for businesses to manage data privacy correctly, especially in light of the Facebook/Cambridge Analytica controversy, as well as the Google breach and subsequent decision to shut down Google+.

Spotlight

Northrop Grumman M5 Network

Northrop Grumman is a leader in all aspects of computer network operations and cybersecurity, offering innovative solutions to help secure the nation’s cyber future. The company’s decades-long expertise cuts across every sector: intelligence, Defence, civil, state and local, and commercial. Northrop Grumman acquired M5 Network Security in 2012 . M5's core business develops and manufactures secure network communications solutions for Defence departments, governments, and corporate entities.

OTHER WHITEPAPERS
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Sharkgate Whitepaper

whitePaper | December 11, 2019

SharkGate specializes in protecting websites and has geared up to build the next-generation of website cyber protection: SharkGate is creating the World’s first distributed ledger powered Cyber Security solution designed exclusively to protect websites against hackers. SharkGate is taking a new approach that will change website security as the industry knows it and make the next-generation of cyber protection available to all websites worldwide.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More

Spotlight

Northrop Grumman M5 Network

Northrop Grumman is a leader in all aspects of computer network operations and cybersecurity, offering innovative solutions to help secure the nation’s cyber future. The company’s decades-long expertise cuts across every sector: intelligence, Defence, civil, state and local, and commercial. Northrop Grumman acquired M5 Network Security in 2012 . M5's core business develops and manufactures secure network communications solutions for Defence departments, governments, and corporate entities.

Events