eSentire
Photos: RSA Conference 2020, part 2
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part one of the photos is …
eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions
This report is no longer available. Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. This …
Cloud misconfigurations surge, organizations need continuous controls
Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, …
esCLOUD extends managed detection and response to cloud platforms
eSentire announced the availability of esCLOUD. This comprehensive portfolio extends eSentire’s industry-leading MDR capabilities and elite threat hunting expertise for …
New infosec products of the week: February 14, 2020
RSA Archer SaaS: An integrated approach to managing risk RSA Archer SaaS can help reduce the time and resources dedicated to on-premise platform upgrades, patches, and …
Now available: eSentire’s 2019 Annual Threat Intelligence Report
Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as …
eSentire appoints Charles “C.J.” Spallitta as Chief Product Officer
eSentire, the global leader in cloud-delivered Managed Detection and Response (MDR), announced the appointment of Charles “C.J.” Spallitta as the company’s …
Recommendations for navigating the dynamic cybercrime landscape
In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-paced …
Emotet remains the dark market leader for delivery-as-a-service
The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, …
How are enterprises coping with the security challenges brought on by digital transformation initiatives?
451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, …
Do third-party users follow security best practices and policies?
Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …
Managed detection and response: Separating the players from the pretenders
Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) is an answer to the fact that threat actors have increased …
Featured news
Sponsored
Don't miss
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2024-4671)
- May 2024 Patch Tuesday forecast: A reminder of recent threats and impact
- How secure is the “Password Protection” on your files and drives?
- F5 fixes BIG-IP Next Central Manager flaws with public PoCs (CVE-2024-21793, CVE-2024-26026)
- Zscaler swats claims of a significant breach