NEWSROOM

News Highlights
Comprehensive collection of ESET News, including the highest performing press releases, research, and thought leadership content gathered on single page.ESET Launches Cloud Workload Protection and AI Enhancements for ESET PROTECT Customers
ESET, a global leader in cybersecurity, launched ESET Cloud Workload Protection as part of a comprehensive update for its ESET PROTECT Platform. Announced at RSAC 2026, this new module helps customers to move beyond endpoints and servers to cover cloud workloads, significantly enriching telemetry for detection and response while consolidating security management across endpoint and cloud environments inside a single pane of glass.
Level Up with B1G2 Technologies at the Philippine Tech Show 2026
B1G2 Technologies is gearing up for our booth at the Philippines’ premier technology trade show, the Philippine Tech Show 2026. Hosted by the Philippine Cable and Telecommunications Association (PCTA), this event brings together industry leaders, innovators, tech enthusiasts, and decision-makers from across the Philippines and beyond.
Invisible vs. Visible Watermarking: What Suits Your Organization?
The article emphasizes the importance of watermarking in preventing data leaks that occur even after legitimate access is granted. It discusses both visible and invisible watermarking, detailing their unique advantages and use cases. By combining these methods, organizations can enhance accountability and traceability for sensitive information, addressing risks effectively during exposure.
OpenClaw: your personal AI assistant – and your personal risk
AI technology is advancing towards automation with agents like OpenClaw that execute tasks independently on users’ computers. This capability poses risks, especially if an attacker gains control, leading to unauthorized actions. Users must be cautious with permissions to prevent exploitation. Controlled use of AI agents is essential for safety.
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. What do M&S and Co-op Group have in common? Aside from...
Is your LinkedIn profile revealing too much?
The article emphasizes the risks of sharing personal information on LinkedIn, including phone numbers and email addresses, which can be exploited by cybercriminals using web scraping techniques. It advises users to configure privacy settings, limit shared information, and verify connection requests to mitigate potential data breaches and identity theft.






