eSentire CEO Shifts Focus to AI-Driven Managed Security

As malicious actors turbocharge their attacks with artificial intelligence, eSentire CEO James Foster is revolutionizing the company's managed security approach with an AI-driven, agentic model that combines lightning-fast automation with human expertise. This game-changing strategy enables businesses to keep pace with the rapidly evolving…

https://osintsights.com/esentire-ceo-shifts-focus-to-ai-driven-managed-security

#AidrivenSecurity #ManagedSecurity #Esentire #ArtificialIntelligence #Mdr

eSentire CEO Shifts Focus to AI-Driven Managed Security

Discover how eSentire's CEO is shifting focus to AI-driven managed security, rebalancing human expertise with automation to combat faster threats - learn more now!

OSINTSights

🎉 A new Brand Story is live — this time with eSentire!

We sat down with Dustin Hillard, CTO at #eSentire, for a powerful conversation about #AgenticAI and what it really means to reach human equivalency in security operations.

From decision-making to autonomous action, this isn’t just theory — it’s a real-world look at outcomes when AI is trained and tuned with purpose.

🎥 Watch the video:
https://youtu.be/qmca7RCzSAQ

📝 Read the full story:
https://www.itspmagazine.com/their-stories/reaching-human-equivalency-with-agentic-ai-a-real-world-look-at-security-outcomes-an-esentire-brand-story-with-dustin-hillard

🔎 Learn more about eSentire here:
https://itspm.ag/esentire-sorry4ek

Thanks to eSentire for supporting the conversation and helping us explore where AI meets security in the real world.

Sean Martin, CISSP & Marco Ciappelli
Co-Founders at ITSPmagazine

#cybersecurity #AI #agenticAI #infosec #esentire #brandstory #itspmagazine #securityoutcomes #securityoperations #genai #infosec #infosecurity #aisecurity

Reaching Human Equivalency with Agentic AI: Real-World Security Outcomes | An eSentire Brand Story

YouTube
The Stark Truth Behind the Resurgence of Russia’s Fin7 – Krebs on Security

Passkey implementations by Google, Amazon, Microsoft vulnerable to AitM attacks, research

Attackers can proxy login pages, removing mention of passkeys and prompting users to resort to passwords, finds eSentire.

https://www.computing.co.uk/news/4331630/passkey-implementations-google-amazon-microsoft-vulnerable-aitm-attacks-research

#technews #aitm #mitm #passkey #yubikey #esentire #infosec #cybersecurity

Passkey implementations by Google, Amazon, Microsoft vulnerable to AitM attacks, research

Passkeys have surged in popularity in recent months as organisations recognise them as an effective way to combat phishing attacks, and with major tech companies such as Apple, Microsoft and Google promoting their adoption.