Please turn on your JavaScript for this page to function normally.
eSentire report
eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

This report is no longer available. Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. This …

cloud
Cloud misconfigurations surge, organizations need continuous controls

Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, …

eSentire
esCLOUD extends managed detection and response to cloud platforms

eSentire announced the availability of esCLOUD. This comprehensive portfolio extends eSentire’s industry-leading MDR capabilities and elite threat hunting expertise for …

RSA Adaptive Authentication
New infosec products of the week: February 14, 2020

RSA Archer SaaS: An integrated approach to managing risk RSA Archer SaaS can help reduce the time and resources dedicated to on-premise platform upgrades, patches, and …

eSentire report
Now available: eSentire’s 2019 Annual Threat Intelligence Report

Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as …

eSentire appoints Charles “C.J.” Spallitta as Chief Product Officer

eSentire, the global leader in cloud-delivered Managed Detection and Response (MDR), announced the appointment of Charles “C.J.” Spallitta as the company’s …

lock
Recommendations for navigating the dynamic cybercrime landscape

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-paced …

Danger
Emotet remains the dark market leader for delivery-as-a-service

The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, …

How are enterprises coping with the security challenges brought on by digital transformation initiatives?

451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, …

user
Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …

abstract
Managed detection and response: Separating the players from the pretenders

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) is an answer to the fact that threat actors have increased …

eSentire
Whitepaper: Cybersecurity is improving, but is it enough?

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, …

Don't miss

Cybersecurity news