eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider information on the players, their motivations, tactics and targets… Continue reading eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Cloud misconfigurations surge, organizations need continuous controls

Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, according to DivvyCloud research. Companies failing to adopt a holistic approach to … Continue reading Cloud misconfigurations surge, organizations need continuous controls

New infosec products of the week: February 14, 2020

RSA Archer SaaS: An integrated approach to managing risk RSA Archer SaaS can help reduce the time and resources dedicated to on-premise platform upgrades, patches, and maintenance activities, as well as enable customers to focus on maturing and expandi… Continue reading New infosec products of the week: February 14, 2020

Now available: eSentire’s 2019 Annual Threat Intelligence Report

Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as practical recommendations for readers seeking to understand and better respond … Continue reading Now available: eSentire’s 2019 Annual Threat Intelligence Report

Recommendations for navigating the dynamic cybercrime landscape

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-fast paced threat environment. How has the cybersecurity threat landscape evolved in… Continue reading Recommendations for navigating the dynamic cybercrime landscape

Emotet remains the dark market leader for delivery-as-a-service

The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, according to the annual threat report by eSentire. Emotet is the leader The r… Continue reading Emotet remains the dark market leader for delivery-as-a-service

How are enterprises coping with the security challenges brought on by digital transformation initiatives?

451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, the challenges they face, and how they are accommodating emerging technologi… Continue reading How are enterprises coping with the security challenges brought on by digital transformation initiatives?

Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, One Identity reveals. Most organizations grant third-party users acces… Continue reading Do third-party users follow security best practices and policies?