The eSentire Blog

Company News

1 M

Networking, engineering and education | Cyber Work Podcast

As part of National Cybersecurity Awareness Month, Tia Hopkins, Vice President of Global Sales Engineering at…

READ NOW →

Managed Detection and Response

3 M

MDR Vendors: Separating the Players from Pretenders

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR)…

READ NOW →

Cybersecurity Strategy

2 M

Avoid the DIY Cybersecurity Trap

"Do it yourself” is an idea that has a certain romantic quality to it. It conjures up pleasant emotions and…

READ NOW →

Cybersecurity Strategy

5 M

Avoid Bad Security Buying Decisions

Originally posted on Security Boulevard on September 17, 2019Remaining competitive means staying abreast of—and…

READ NOW →

Cybersecurity Strategy

5 M

A Myopic Dystopia: Blame the Actor

Originally posted on Corporate Compliance Insights on September 27, 2019There’s a natural desire among humans to…

READ NOW →

Threat Intelligence

1 M

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

Modern malware is increasingly sophisticated. While newer antivirus solutions provide a more effective layer of…

READ NOW →

Company News

2 M

Tia Hopkins Wins Outstanding Educator Leadership Award from SC MEDIA

eSentire is pleased to announce that Tia Hopkins, Vice President, Global Sales Engineering, has won an SC Media…

READ NOW →

Cybersecurity Strategy

3 M

Harvard talk on innovation: The verdict on legal tech adoption vs. associated risk

Last week, I was honored to speak at the Harvard Law School’s 2019 Legal Technology Symposium on the risks…

READ NOW →

Third-Party Cyber Risk

4 M

It’s Time to Take Third-Party Risk Seriously

Originally posted in Law.com on September 3, 2019 A recent study of 600 IT and security decision-makers revealed…

READ NOW →

Cybersecurity Strategy

2 M

A Perpetual Problem

We have all seen the news articles and studies covering the “skills gap” or “talent gap” in cybersecurity. This…

READ NOW →

Threat Intelligence

2 M

2019 Post-ILTACON eSentire Recap

Disney played host last week to an international crowd of legal IT professionals at ILTACON 2019. The heat and…

READ NOW →

Cybersecurity Strategy

3 M

Understanding the Attack Life Cycle

Understanding the life cycle of an attack is a key component to being able to prevent, detect and respond.…

READ NOW →
Page
of 52