Please turn on your JavaScript for this page to function normally.
How are enterprises coping with the security challenges brought on by digital transformation initiatives?

451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, …

user
Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …

abstract
Managed detection and response: Separating the players from the pretenders

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) is an answer to the fact that threat actors have increased …

eSentire
Whitepaper: Cybersecurity is improving, but is it enough?

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, …

users
A continuous problem: Tackling the cybersecurity skills shortage

We have read the over abundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and …

eSentire whitepaper
Report: 2019 eSentire Threat Intelligence Spotlight

This new report Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and …

eSentire whitepaper
Whitepaper: The self-fulfilling prophecy of the cybersecurity skills shortage

The tale of two sides: how would cybersecurity pros and organizations solve the cybersecurity skills gap shortage? eSentire asked cybersecurity experts to weigh in on the …

chess
Solving security problems: Security advice for those with limited resources

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, gives SMBs advice on how to minimize the risk of a data breach through better security …

eSentire
Whitepaper: Know your enemy, know your risk

Understanding the risks to your most sensitive data begins with understanding the mindset of the hackers attacking it. Knowing why they do it can help identify where and how …

eSentire report
Download: eSentire Q1 2019 Quarterly Threat Report

The eSentire Q1 2019 Quarterly Threat Report provides a snapshot of threat events and trends investigated by the eSentire Security Operations Center (SOC) in January, February …

person
Nearly half of firms suffer data breaches at hands of vendors

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to …

eSentire whitepaper
Whitepaper: Third-Party Risk to the Nth Degree

For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors. The Third-Party Risk to the Nth …

Don't miss

Cybersecurity news