The eSentire Blog

Ransomware

4 M

How can you fight ransomware? Solutions to 11 common ransomware failure points

Ransomware is an increasingly appealing cyberattack method. Compared to traditional methods, ransomware typically…

READ NOW →

Cybersecurity Strategy

5 M

Balancing digital privacy and connectedness on social media

The use of social media has become prolific for both private users and organizations. Threat actors have not been…

READ NOW →

Threat Intelligence

3 M

Distributed Denial of Service (DDoS) attack FAQs and important things to know

What is “DDoS”? DDoS, which stands for Distributed Denial of Service, is a type of cyberattack that attempts to…

READ NOW →

Attacks/Breaches

4 M

Paradise Papers lost: why this breach should concern legal and accounting firms

Milton's epic poem, Paradise Lost tells the biblical story of the fall of man: Satan’s temptation of Adam and Eve…

READ NOW →

Threat Intelligence

4 M

Whaling: phishing for bigger, more powerful targets

You’ve probably heard of phishing (and the damage its wreaking worldwide), but have you heard of whaling? In this…

READ NOW →

Attacks/Breaches

3 M

Sonic Data breach: let it be a lesson

Sonic drive-in is one of the latest victims in a long line of recent cybersecurity breaches. The fast food…

READ NOW →

Threat Intelligence

4 M

Can your employees identify a phishing attack?

This article first appeared on SC Magazine UK.Phishing attacks are as popular as ever. According to report from…

READ NOW →

Attacks/Breaches

3 M

Cybercriminals strike the NHS, again

On August 25, Scotland’s third-largest National Health Service (NHS) trust was hit by malware, again. This is the…

READ NOW →

Regulatory Compliance

4 M

Equifax cybersecurity breach will trigger regulatory reform

For industry observers, watching the Equifax breach unfold is like watching a slow-motion train wreck. For nearly…

READ NOW →

Threat Intelligence

4 M

Natural disasters threaten more than just physical security

Natural disasters aren’t wholly dedicated to any single season. Tornadoes can occur at any time, but generally…

READ NOW →

Threat Intelligence

2 M

New cyber threat intelligence suggests a rise in phishing-based attacks

We’ve recently released the 2017 Q2 Threat Summary Report, which analyzes threat types, volume, and preferred…

READ NOW →

Threat Intelligence

2 M

A closer look at Petya's / NotPetya's network spreading code

The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in…

READ NOW →
Page
of 22