eSentire
eSentire partners with Carbon Black to deliver an endpoint defense security solution
eSentire released Managed Endpoint Defense, powered by Carbon Black. Managed Endpoint Defense will be powered by Carbon Black’s CB Defense, a cloud-delivered endpoint security …
Cryptocurrency craze drives coinmining malware surge
The cryptocurrency craze of 2018 helped drive a 1,500 percent increase in coinmining malware when compared to 2017, according to eSentire. Coinmining malware mines …
60% of firms believe a major security event will hit in the next few years
Only 30 percent of 1,250 senior executives, management and security practitioners in the U.S., U.K. and Canada are confident their business will avoid a major security event …
eSentire acquires cybersecurity AI leader Versive
eSentire acquired Versive and appointed the senior leadership of former Versive executives Dustin Rigg Hillard as Chief Technology Officer, Ashley Fidler as Vice President, …
IIS attacks surge from 2,000 to 1.7 million over last quarter
IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive …
New infosec products of the week: September 14, 2018
Exabeam adds updated Case Management module to behavioral analytics product Exabeam Case Management is a module that provides a user interface designed for the workflows of …
eSentire launches integrated MDR and SIEM platform for threat visibility and response
eSentire announced a partnership with Sumo Logic. This partnership will allow eSentire to deliver the MDR platform that offers full spectrum detection and response …
eSentire and Cyxtera partner to bring zero-trust network protection to midsize enterprises
eSentire and Cyxtera Technologies announced a partnership to bring customers security solutions designed to secure today’s hybrid IT environment. The partnership combines …
91% of critical incidents involve known, legitimate binaries like PowerShell
Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …
Rudimentary attacks pose the greatest risk to midsized organizations
Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to eSentire. Attacks …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments