Security News

Whitepaper: Mobile banking regulations, threats and fraud prevention
2020-09-21 02:30

The usage of banking services through a mobile app has quickly been embraced by consumers. Currently, researches indicate that mobile banking apps are often not as secure as expected.

Whitepaper: Cloud security risks and how to mitigate them
2020-03-30 03:00

So how do we explain the ever-increasing number of data breaches? According to Cloud Security Risks & How to Mitigate Them.Insufficient access management and account hijacking.

Whitepaper: Cybersecurity is improving, but is it enough?
2019-11-12 04:30

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, commissioned by eSentire,...

Whitepaper: SIEM + Threat Intelligence
2019-11-04 04:30

SIEMs are a powerful tool for collecting and correlating event data and have a well-deserved place within your security infrastructure for centralized log management. But to truly shine they need...

Whitepaper: Busting the myth that more threat intel feeds lead to better security
2019-10-31 04:00

It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to confusion, disorganization,...

Whitepaper: Building a Threat Intelligence Programme
2019-10-28 04:30

ThreatConnect surveyed more than 350 UK information security decision makers. Building a Threat Intelligence Programme discusses research findings on best practices and impact of those programmes....

Whitepaper: Make smarter decisions by using orchestration with intelligence
2019-10-22 03:30

Analysts in security teams make decisions all day in their investigations that impact the security of the entire organization: Where should I look next? What should I do about this alert? Is this...

Whitepaper: Identifying Web Attack Indicators
2019-10-07 03:30

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector attackers use when breaching...

Whitepaper: The self-fulfilling prophecy of the cybersecurity skills shortage
2019-09-25 03:45

The tale of two sides: how would cybersecurity pros and organizations solve the cybersecurity skills gap shortage? eSentire asked cybersecurity experts to weigh in on the widening cybersecurity...

Whitepaper: Security Orchestration with Threat Intelligence
2019-09-03 03:00

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. The post Whitepaper: Security...