Security News

The usage of banking services through a mobile app has quickly been embraced by consumers. Currently, researches indicate that mobile banking apps are often not as secure as expected.

So how do we explain the ever-increasing number of data breaches? According to Cloud Security Risks & How to Mitigate Them.Insufficient access management and account hijacking.

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, commissioned by eSentire,...

SIEMs are a powerful tool for collecting and correlating event data and have a well-deserved place within your security infrastructure for centralized log management. But to truly shine they need...

It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to confusion, disorganization,...

ThreatConnect surveyed more than 350 UK information security decision makers. Building a Threat Intelligence Programme discusses research findings on best practices and impact of those programmes....

Analysts in security teams make decisions all day in their investigations that impact the security of the entire organization: Where should I look next? What should I do about this alert? Is this...

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector attackers use when breaching...

The tale of two sides: how would cybersecurity pros and organizations solve the cybersecurity skills gap shortage? eSentire asked cybersecurity experts to weigh in on the widening cybersecurity...

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. The post Whitepaper: Security...