The eSentire Blog

Regulatory Compliance

4 M

We stand on guard for thee: Canada's breach of security safeguards regulations

On November 1, 2018, the Canadian Breach of Security Safeguards Regulations1 of the Personal Information…

READ NOW →

Managed Detection and Response

1 M

Evolving MDR with artificial intelligence: the Versive acquisition

Since its inception eSentire has defined the Managed Detection and Response (MDR) category as a service offering a…

READ NOW →

Cybersecurity Strategy

5 M

SIEM: the many shades of success and failure

It’s no secret that there’s difficulty in implementing, operating and deriving business value from SIEMs. Service…

READ NOW →

Managed Detection and Response

4 M

eSentire esLog: adapting MDR for cloud workloads

Each time I attend one of the major cybersecurity conferences such as RSA or Black Hat, it is simultaneously…

READ NOW →

Managed Detection and Response

1 M

MSSPs chasing the MDR dream? The good, the bad, the ugly

If you’re up-to-date on cyber security trends, you’ve seen many traditional Managed Security Services Providers…

READ NOW →

Managed Detection and Response

2 M

The MDR difference: Rapid fire detection and containment of cyber threats

The current state of cybersecurity as it relates to the rapidly evolving threat landscape has led many…

READ NOW →

Cybersecurity Strategy

3 M

Law firms: you can't buy yourself out of risk

While no amount of insurance can protect your reputation, you also can’t buy yourself out of the cyber risks that…

READ NOW →

Threat Intelligence

2 M

eSentire observes an increase in exploitation attempts against routers

On July 19, 2018, eSentire observed an increase in exploitation attempts targeting Small-Office/Home Office (SOHO)…

READ NOW →

Threat Intelligence

5 M

Living off the land: the command and control phase

This is the fifth and final blog post in the Living Off the Land blog series. In this edition, the focus is on how…

READ NOW →

Regulatory Compliance

4 M

Updates to the SEC cybersecurity guidance affect how breaches are disclosed

The U.S. Security and Exchange Commission (SEC) recently published an updated guidance for finance companies,…

READ NOW →

Threat Intelligence

3 M

Covert attack techniques growing in popularity

The eSentire Threat Intelligence team released their findings and analysis of cybersecurity incidents from the…

READ NOW →

Cybersecurity Strategy

4 M

Insurance providers are at risk

The insurance industry is built on trust. Unfortunately, this trust can easily be lost in the event of a cyber…

READ NOW →
Page
of 52