The eSentire Blog

Cybersecurity Strategy

4 M

For truly intelligent cyber security, pair AI with humans

Originally posted in Techerati on July 1, 2019.It’s the human plus technology combination that can truly tackle…

READ NOW →

AI/ML

5 M

Incorporating cloud security strategies into the AI and IoT era

As seen in Risk Management on June 19, 2019Artificial intelligence (AI) and the internet of things (IoT) offer…

READ NOW →

Cybersecurity Strategy

2 M

Are you wearing rose-colored DIY security glasses?

Remember when adequate security for your business was defined as storing information in a locked file cabinet or…

READ NOW →

AI/ML

4 M

How humans and machines can team up for cybersecurity that scales

Originally posted in IT Pro Portal on June 11, 2019.Our lives online have changed at an ever-increasing pace over…

READ NOW →

Threat Intelligence

4 M

Cybersecurity as a collective issue: Bringing UK industry together

1. ‘First things first. Get the champagne.’ Winston Churchill, 1931, New York. Recently, eSentire and our…

READ NOW →

Cybersecurity Strategy

3 M

The big enterprise security problem posed by small – or at least smaller – businesses

As originally posted on Enterprise CIO As the threat level grows and diversifies, global enterprises continue to…

READ NOW →

Cybersecurity Strategy

2 M

How manufacturers can thwart modern cybersecurity threats

As orginally published on SmartIndustry By Mark Sangster, VP & industry security strategist, eSentire Joe…

READ NOW →

Cybersecurity Strategy

3 M

Brexit-sized gap between U.K. firms cyber readiness and cyber threats

The recent Cyber Security Breach Survey 2018 Report (sponsored by the Ministry of Digital, Culture, Media and…

READ NOW →

AI/ML

4 M

The importance of building an integrated AI-human cybersecurity strategy

As originally posted on Enterprise CIO on March 27, 2019 In light of today’s digital transformation causing…

READ NOW →

Cybersecurity Strategy

3 M

The Diminishing Human Element

A growing scale of digital networks across on-premises, cloud and hybrid environments has necessitated automation…

READ NOW →

Cybersecurity Strategy

3 M

Want to weed out anomalies? Use an adversary mindset

As originally posted on Security Boulevard, January 24, 2018 When it comes to anomalies, the sheer volume can be…

READ NOW →

AI/ML

4 M

Opinion: AL and ML choices can dramatically impact data security

As originally posted on Information Management on December 24, 2018As networks have advanced in complexity, so…

READ NOW →
Page
of 14