Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions
This Annual Threat Intelligence Report provides perspectives from 2019 and predictions for 2020 based on events investigated by eSentire’s Security Operations Center (SOC). Eliminate guesswork and get in-depth insights and practical recommendations for...
What Is EDR and How Does It Fit Into Your Security Strategy?
Back in 2013, Gartner’s Anton Chuvakin set out to name a new set of security solutions that sniff out suspicious activity on endpoints. After what he called “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other...
What the Top 3 Critical Steps for General Counsels’ Role in Maintaining Cybersecurity
While crises of one form or another have always plagued companies, the intensity and regularity of cybersecurity attacks have surged, with 86 percent of the executives surveyed for one study reporting that they’ve encountered a cyber incident or data theft, loss, or...
Two Simple Ways to Maximize Privilege and Work Product Protections in Data Breach Investigations
Data breach incident investigation materials are not automatically protected from discovery in civil litigation or government investigations. Whether such materials are protected from discovery can have serious cost and public relations implications for a company that...







