eSentire
How are enterprises coping with the security challenges brought on by digital transformation initiatives?
451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, …
Do third-party users follow security best practices and policies?
Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …
Managed detection and response: Separating the players from the pretenders
Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) is an answer to the fact that threat actors have increased …
Whitepaper: Cybersecurity is improving, but is it enough?
Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, …
A continuous problem: Tackling the cybersecurity skills shortage
We have read the over abundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and …
Report: 2019 eSentire Threat Intelligence Spotlight
This new report Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and …
Whitepaper: The self-fulfilling prophecy of the cybersecurity skills shortage
The tale of two sides: how would cybersecurity pros and organizations solve the cybersecurity skills gap shortage? eSentire asked cybersecurity experts to weigh in on the …
Solving security problems: Security advice for those with limited resources
In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, gives SMBs advice on how to minimize the risk of a data breach through better security …
Whitepaper: Know your enemy, know your risk
Understanding the risks to your most sensitive data begins with understanding the mindset of the hackers attacking it. Knowing why they do it can help identify where and how …
Download: eSentire Q1 2019 Quarterly Threat Report
The eSentire Q1 2019 Quarterly Threat Report provides a snapshot of threat events and trends investigated by the eSentire Security Operations Center (SOC) in January, February …
Nearly half of firms suffer data breaches at hands of vendors
As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to …
Whitepaper: Third-Party Risk to the Nth Degree
For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors. The Third-Party Risk to the Nth …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments