Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Last Friday, a massive ransomware attack struck organizations in at least 100 countries. The attack, named WannaCry, exploited code from the NSA and ransomware paired with a worm to hold more than 200,000 machines at ransom, demanding payment from its victims in exchange for their files.
In today’s webinar, we shared our latest findings on WannaCry and provided some additional context around the short-term implications of the attack – including the possibility of new WannaCry variants and reuse of the DoublePulsar backdoor. We then offered our forecast for what this could mean for the future. Here’s a re-cap.
We’re hopeful that organizations will significantly alter their continuous patch hygiene. Microsoft has even released new emergency patches for Windows XP and 2003, which speaks to the seriousness of the event and the risk of deploying out-of-date operating systems in production environments.
We haven’t heard the last of the Shadow Brokers. The hacking group claims to have more tools and information that have been stolen from the US Intelligence Community. As they expose new “cyber weapons” that are being adopted by opportunistic threat actors, all of a sudden everyone is at risk.
TheWannaCry story will inspire a new set of attacks. They won’t all necessarily be ransomware, but it remains to be the most hyper-productive model for cybercriminals in terms of monetizing attacks.
Knowing how quickly worm-based attacks can do massive damage, there is potential for physical damage to infrastructure as we move to IoT. This becomes something that we have to decide how we’re going to manage risk. The lack of focus or preparedness for IoT cybersecurity puts everyone at increased risk.
With infrastructure that is globally connected and the challenge of patch management, fast-spreading threats can cause massive damage. Especially to embedded systems where there is not ongoing support for vulnerabilities. Plus, future attacks will involve less and less human intervention.
There’s an attack vs. defense asymmetry in that it’s really easy to for attackers to attack, and really difficult for organizations to respond. Organizations will be on their own, unless they start to build out their trust circles and collaborate on how to defend against threats.
We have to be mindful about attributing attacks to specific geographies or state-entities. In this case, officials have stated that Russia was considered to be the most attacked. But if we think that a political opponent will retaliate, that could mean cyberwarfare against everybody.
As we shared in the webinar, the best way for organizations to significantly reduce their risk is to harden their security posture. Start by ensuring these best practices are part of your overall cybersecurity approach.
We used to see longer periods of time between big attacks, which gave organizations time to detect, analyze and remediate the threat accordingly; establish or reinforce cybersecurity best practices; and frankly, get back to work.
But now, with the steady increase in the cadence of attacks, cybersecurity must become engrained in daily business operations. From actively monitoring security alerts to enacting new internal policies, progressive organizations are prioritizing the problem to protect not only their data, but their bottom lines.
With new insights from CTO, Mark McArdle and Director of Threat Intelligence at eSentire, Viktors Engelbrehts, the webinar provides an in-depth explanation of the following:
Get notified of the latest news, intel and helpful tools & assets. You can unsubscribe anytime.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.