Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by eSentire

The Self-Fulfilling Prophecy of the Cybersecurity Skills Shortage

eSentire is looking at the cybersecurity skills shortage from a different angle. By surveying hundreds of organizations and cybersecurity professionals, eSentire was able to gain a clearer picture of the challenges and find more effective solutions. The results reflect how a self-fulfilling prophecy has compounded the problem and what organizations and cybersecurity experts are doing to address that challenge.

White Paper | Presented by eSentire

The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

Review the report on the probability of your organization being exploited and how to remediate before your business is disrupted.

Miscellaneous | Presented by eSentire

Q1 2019 Quarterly Threat Report

Read the Q1 2019 Quarterly Threat Report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.

White Paper | Presented by eSentire

Cybersecurity FutureWatch 2018

Cybersecurity FutureWatch 2018 is an in-depth analysis of cyber trends and forecasts. This data-driven report illustrates critical industry developments that will inform a company’s cybersecurity planning as technology advances.

eBook | Presented by eSentire

2018 Annual Threat Report

eSentire’s 2018 Annual Threat Report highlights a growing botnet attack infrastructure, an exponential increase in coinmining and the rising threat of Maldocs.

White Paper | Presented by eSentire

Third-Party Risk to the Nth Degree

The Third-Party Risk to the Nth Degree white paper provides quantitative and contextual measures by which your organization can compare current practices and investment to help mitigate third-party risk.

White Paper | Presented by eSentire

Know Your Enemy. Know Your Risk.

Understanding the risks to your most sensitive data begins with understanding the mindset of the hackers attacking it. This report gets inside the mind of a hacker, analyzing their motivations for penetrating cyber defenses, their methods and the most effective ways to reduce your risk.