Please turn on your JavaScript for this page to function normally.
eSentire partners with Carbon Black to deliver an endpoint defense security solution

eSentire released Managed Endpoint Defense, powered by Carbon Black. Managed Endpoint Defense will be powered by Carbon Black’s CB Defense, a cloud-delivered endpoint security …

Coins
Cryptocurrency craze drives coinmining malware surge

The cryptocurrency craze of 2018 helped drive a 1,500 percent increase in coinmining malware when compared to 2017, according to eSentire. Coinmining malware mines …

gap
60% of firms believe a major security event will hit in the next few years

Only 30 percent of 1,250 senior executives, management and security practitioners in the U.S., U.K. and Canada are confident their business will avoid a major security event …

eSentire acquires cybersecurity AI leader Versive

eSentire acquired Versive and appointed the senior leadership of former Versive executives Dustin Rigg Hillard as Chief Technology Officer, Ashley Fidler as Vice President, …

bomb
IIS attacks surge from 2,000 to 1.7 million over last quarter

IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive …

eSentire
New infosec products of the week​: September 14, 2018

Exabeam adds updated Case Management module to behavioral analytics product Exabeam Case Management is a module that provides a user interface designed for the workflows of …

eSentire launches integrated MDR and SIEM platform for threat visibility and response

eSentire announced a partnership with Sumo Logic. This partnership will allow eSentire to deliver the MDR platform that offers full spectrum detection and response …

eSentire and Cyxtera partner to bring zero-trust network protection to midsize enterprises

eSentire and Cyxtera Technologies announced a partnership to bring customers security solutions designed to secure today’s hybrid IT environment. The partnership combines …

Microsoft PowerShell
91% of critical incidents involve known, legitimate binaries like PowerShell

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …

abstract
Rudimentary attacks pose the greatest risk to midsized organizations

Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to eSentire. Attacks …

Don't miss

Cybersecurity news