The eSentire Blog

Cybersecurity Strategy

9 M

Why You Should Take Advantage of Microsoft 365 Defender, the Microsoft 365 E5 Security Suite

Over the past 2-3 years, cybersecurity leaders and practitioners have faced immense pressure to keep up with the…

READ NOW →

TRU Positive/Bulletin

7 M

Gootloader Malware Leads to Cobalt Strike and Hand-on-Keyboard Activity

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cyber Risk

11 M

How to Increase Cyber Resilience at Your Organization

As the attack surface continues to grow across on-premises, cloud, or hybrid environments, so does cyber risk.…

READ NOW →

Threat Intelligence

9 M

MD(I)R: Why Investigation is the Invisible ‘I’ in MDR

Today’s security leaders are challenged not just by a skills shortage and budgetary constraints, but by immense…

READ NOW →

Cloud Protection

5 M

5 Common Misconceptions About Cloud Security

In today's remote world, organizations have no choice but to shift to the cloud. Since 2010, the global cloud…

READ NOW →

Cybersecurity Strategy

4 M

2023 Predictions for Cloud Security

Industry executives and experts share their predictions for 2023. Read them in this 15th annual VMblog.com series…

READ NOW →

Threat Intelligence

3 M

Tactical Experts Driving Success for Ransomware Gangs

Ten, twenty years ago, when you heard the word ‘ransomware’ it was because you (or someone you know) clicked a…

READ NOW →

Threat Response Unit

11 M

Hackers Exploit Fortinet Devices to Spread Ransomware within Corporate Environments, Warns eSentire

Summary In mid and late November 2022, eSentire detected and shut down hackers attempting to infect two of its…

READ NOW →

TRU Positive/Bulletin

8 M

Recent FakeBat Activity Observed in December 2022

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
5 M

Creating Resilience Against Future Supply Chain Attacks

The very nature of the third-party relationships required in supply chain management presents the greatest…

READ NOW →

Cybersecurity Strategy

4 M

Cyber Resilience as a Component of Incident Response Planning

“We bend so that we don’t break.” – A Yoga saying I came across this saying earlier this week, and I thought it…

READ NOW →

TRU Positive/Bulletin

4 M

FortiOS - Authentication Bypass CVE-2022-40684

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 35