Richard Marko

ESET Promotes Richard Marko to CEO

ESET has appointed Richard Marko as CEO. The new management has already outlined strategies for worldwide market development of the company and its subsidiaries.

“One of our primary goals will be to open even more research centers to reaffirm our position as one of the technological leaders in the industry,” Marko said.

These centers will carry out leading-edge analysis on the latest trends in IT security and provide ESET product users and the general public with information on new technologies and ways to protect themselves from cyberthreats. ESET has already established a Cyber Threat Analysis Center in San Diego, Calif. Building on the success of ESET’s existing global research resources, the center is committed to working to further protect ESET’s corporate clients and home users alike by collaborating with universities, law enforcement authorities, Internet service providers and other agencies that actively combat cybercrime.

Overseeing the extensive network of research teams will be the newly appointed chief research officer, Juraj Malcho. Malcho has been with ESET since 2004 and worked his way up to become the head of the Virus Lab, the nerve center for threat analysis.

Additionally, ESET will continue to focus on advancing the portfolio of consumer and business endpoint security products for all supported platforms: Windows, Mac OS X and Linux. The next generation of ESET’s flagship product, ESET Smart Security for Windows, will be released for public testing as a beta version in the coming weeks, with the final release coming later in 2011. Overseeing the main technology arm of ESET will be the new chief technology officer, Pavel Luka, along with Chief Software Architect Tomáš Kaláb. As accomplished developers, Luka and Kaláb have already helped develop second-, third- and fourth generations of ESET security solutions.

Marko outlined his vision for the company: “ESET will focus on enriching its product portfolio for new mobile platforms, and we are closely following the market opportunities for tablets.” Also, a security product for the Android mobile platform is being developed with top priority. Simultaneously, ESET is keeping close watch on the evolution of the iOS mobile platform.

The threat landscape is changing, rapidly subjecting corporations to a wide range of attacks. Wikileaks and operation Aurora confirm that data breaches are increasingly becoming part of everyday life for businesses. This is why data loss prevention (DLP) has the attention of ESET’s technology developers. “ESET is actively working on new DLP solutions to protect its business clients,” confirmed Marko.

Marko graduated from the information systems department of Slovak Technical University in Slovakia. He began his career with ESET during his college studies and is one of the co-authors of the ESET NOD32 antivirus scanning engine. Initially, he held the post of chief software architect of the scanning core, but in 2008 he became chief technology officer. His works on antivirus have been published in Slovakia and abroad.


Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3