Guide: Making the financial case for outsourcing endpoint protection

Outsourcing your endpoint protection can deliver positive returns by improving operational efficiency and minimizing risk, but it’s not always easy to prove the business case. This guide delivers specific guidance on how to calculate savings in t… Continue reading Guide: Making the financial case for outsourcing endpoint protection

Webinar: You don’t get a pass on cybersecurity during a crisis

In this webinar, Mark Sangster discusses how the COVID-19 crisis is affecting businesses and individuals and the need to stay vigilant. Emerging threats from bad actors who are taking advantage of the COVID-19 crisis are inevitable. Distributed workfor… Continue reading Webinar: You don’t get a pass on cybersecurity during a crisis

Coronavirus: You don’t get a pass when it comes to cybersecurity

I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives with restricted travel and cancelled public events. eSentire included. On the su… Continue reading Coronavirus: You don’t get a pass when it comes to cybersecurity

Applying the 80/20 rule to cloud security

The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, athletics, etc.) will account for 80 percent of your results. Simply put: work s… Continue reading Applying the 80/20 rule to cloud security

Photos: RSA Conference 2020, part 2

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part one of the photos is available here. Here are a few photos from the event, featured vendors include… Continue reading Photos: RSA Conference 2020, part 2

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider information on the players, their motivations, tactics and targets… Continue reading eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Cloud misconfigurations surge, organizations need continuous controls

Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, according to DivvyCloud research. Companies failing to adopt a holistic approach to … Continue reading Cloud misconfigurations surge, organizations need continuous controls

New infosec products of the week: February 14, 2020

RSA Archer SaaS: An integrated approach to managing risk RSA Archer SaaS can help reduce the time and resources dedicated to on-premise platform upgrades, patches, and maintenance activities, as well as enable customers to focus on maturing and expandi… Continue reading New infosec products of the week: February 14, 2020