The eSentire Blog

Third-Party Cyber Risk

3 M

The three p’s of third-party risk – prevention, policies and promises

As originally posted to Techerati on March 8, 2019 By implementing a three-pronged approach that brings together…

READ NOW →

Third-Party Cyber Risk

4 M

Nearly half of firms suffer data breach at hands of vendors

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal…

READ NOW →

Cybersecurity Strategy

3 M

Want to weed out anomalies? Use an adversary mindset

As originally posted on Security Boulevard, January 24, 2018 When it comes to anomalies, the sheer volume can be…

READ NOW →

AI/ML

4 M

Opinion: AL and ML choices can dramatically impact data security

As originally posted on Information Management on December 24, 2018As networks have advanced in complexity, so…

READ NOW →

Threat Intelligence

4 M

Revisiting the 2018 threat forecast

In the 2017 Annual Threat Report, the eSentire Threat Intelligence team documented a series of scenarios that…

READ NOW →

Cybersecurity Strategy

4 M

Adapting security response for cloud workloads

As originally posted on Security Boulevard on January 7, 2019 Not long ago, enterprise security could be…

READ NOW →

Threat Intelligence

2 M

Highlights of eSentire's 2018 Annual Threat Report

eSentire’s 2018 Year End Threat Report offers an expansive overview of the threat landscape in 2018. The content…

READ NOW →

Threat Intelligence

3 M

Depth and Breadth: Logs help empower Managed Detection and Response delivery

We’ve all heard it, “it’s not a matter of if, but when.” This phrase is a marketing staple used to instill fear,…

READ NOW →

Regulatory Compliance

3 M

GDPR privacy and cybersecurity: EU flips to the other side of the same coin

Approved this week, the European Parliament and European Commission have agreed to the Cybersecurity Act which…

READ NOW →

Managed Risk Programs

2 M

Driving continuous improvements with Risk Advisory and Managed Prevention

Organizations struggle with the delicate balance between the ever-changing threat landscape and growing pressure…

READ NOW →

Threat Intelligence

3 M

Unpacking the Marriott data breach

The Marriott announcement of unauthorized access to the Starwood guest reservation database amounts to one of the…

READ NOW →

Cybersecurity Strategy

5 M

Manufacturing must adapt to emerging cybersecurity technology and threats

At the National Association of Manufacturers’ (NAM) board meeting, guest speaker Ron Moultrie leveraged his career…

READ NOW →
Page
of 52