What We Do
How we do it
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
Jan 19, 2023
Increased Activity in Google Ads Distributing Information Stealers
THE THREAT On January 18th, 2023, eSentire Threat Intelligence identified multiple reports, both externally and internally, containing information on an ongoing increase in Google advertisements…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Dec 13, 2022
eSentire Named First Managed Detection and Response Partner by Global Insurance Provider Coalition
Waterloo, ON – December 13, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has been named the first global MDR partner by Coalition, the world’s first Active Insurance provider designed to prevent digital risk before it strikes. Like Coalition, eSentire is committed to putting their customers’ businesses ahead of disruption by improving their…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Apr 29, 2016

Future thinking: technology is changing the way organizations manage IT security

4 minutes read
Speak With A Security Expert Now

eSentire has partnered with noted BBC journalist and technologist Ben Hammersley to present BlackHatWhiteHat, a podcast mini-series that dives deep into everything cybersecurity. Each episode features global industry experts who analyze the breach cases dominating today’s headlines, lifting the curtain that conceals the black hat culprits and the white hats working to stop them.

In celebration of the series’ launch, I recently sat down with Ben to learn more about his technological predictions and how those new tools will change the way organizations think about data protection and IT security.

Mandy Bachus (MB): As a technologist, you live on the cutting edge of technological innovations. What sort of trends are gaining popularity?

Ben Hammersley (BH): It’s not a cop out to say, “it depends”. Technological innovations don’t happen at the same time for everyone, and especially in the corporate world. It takes a generation for the major shifts to flood through the system, as it were. So we end up with two types of trend. The first are the buzzwords we read about in magazines - Big Data, Internet of Things, Artificial Intelligence - but these appear more often in PowerPoint decks about Disruptive Innovation than in real life. The second don’t appear to be cutting edge but are the things that are actually, truly, trending: web-based internal process infrastructure, Bring Your Own Device (BYOD) policies, customer service moving to social media, and so on. To the technologically savvy, these appear as decades-old, but to the majority of businesses and normal people worldwide, they’re radically new. Most of the world isn’t adapting to Slack on their Apple Watch: they’re just getting off Lotus Notes.

MB: Of those trends, which do you predict will impact the workplace and how?

BH: I think it’s the shift to the open internet as the network for corporate infrastructure, and the BYOD policies that come with it, that makes the biggest difference. It’s ultimately liberating for everyone concerned, reflects the availability of new services and tools, and respects the sophistication of employees’ 21st century media and social lives. That might be a generational thing to concentrate on, but things like access to Facebook during the working day, or the ability to use WeChat or WhatsApp as legitimate professional communication tools, are proving to be key, especially in recruitment. It’s increasingly hard to recruit talented graduates, for example, to a social-media blocking corporate environment.

MB: What sorts of security risks do these applications pose, particularly in relation to work environments?

BH: It radically increases the number of attack surfaces, both computational and social. In other words, there’s just a whole lot more to hack, and a whole lot more to protect. Computationally, there are many more exposed interfaces, and a device environment that’s increasingly heterogenous and out of the control of traditional IT departments. Socially, it’s so very much easier to find exploitable information about employees and their families, leaving them wide open to sophisticated phishing attacks.

MB: Obviously given the rate of technological adoption, we can anticipate that businesses will integrate new tools quickly; what considerations should organizations bear in mind as the risk associated with these tools grows?

BH: Totally right, and that adaption is accelerating too. I think the main issue is one of mindset, from the boardroom on down. Service industries, without critical physical infrastructure like factories, are entirely dependent on the sanctity of their data and the contents of their employees brains. The core of the business walks out of the door every evening. So the issue is one of balancing the need to keep that data safe, the applications secure, and the so on, with providing the working environment required by a transient workforce. That’s not simply a job for a CTO, but one for the CEO. In fact, it’s increasingly arguable that the difference between the CEO and the CTO in such firms is negligible. Anyway, the core thing, I think, is for that leadership to be aware of, and emphasize in a mature way, the importance of good practice and the risks, especially, of social engineering. But this has to be in a way that respects the possibilities of the tools of the modern world. It requires the leadership to be aware of the true working practices of their employees, and to be undertaking a constant reassessment of how their company actually works. That’s hard work, and rarely done.

Ben Hammersley is a veteran of TV, print and radio. He most recently presented the award-winning Netflix and BBC World flagship series Cybercrimes With Ben Hammersley. He's the author of five books, including the international best-seller, 64 Things You Need To Know Now For Then: How to Face the Digital Future Without Fear (UK title; 2012, Hodder). He is credited with inventing the word ‘podcasting’ in a 2004 article for The Guardian newspaper. You can find him at benhammersley.com.

View Most Recent Blogs

eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.