The eSentire Blog

Cybersecurity Strategy

5 M

eSentire and the SEC: OCIE, EERT 2020 and Beyond

table a, table p { font-size: 1.5rem; line-height: 2rem; } In late July 2020, the Securities and…

READ NOW →

Threat Intelligence

7 M

Capital One Ruling

Why Capital One was forced to disclose its incident report in data breach lawsuitThis blog summarizes the webinar…

READ NOW →

Regulatory Compliance

3 M

What You Need to Know about the California Consumer Privacy Act

Originally posted in Best Manufacturing Practices January 16, 2020On the heels of the European Union’s General…

READ NOW →

Regulatory Compliance

5 M

Navigating the California Consumer Privacy Act

Originally posted in Corporate Compliance Insights November 12, 2019With the California Consumer Privacy Act…

READ NOW →

Third-Party Cyber Risk

4 M

Actions After you Find the Network Anomaly

HIPAA compliance remains a challenge for healthcare organizations, particularly in the face of an ever-expanding…

READ NOW →

Regulatory Compliance

4 M

Why healthcare providers need to approach cybersecurity with a damage-control mindset

As originally posted in FierceHealthcare on March 31, 2019 A key challenge facing healthcare organizations is…

READ NOW →

Cybersecurity Strategy

3 M

Brexit-sized gap between U.K. firms cyber readiness and cyber threats

The recent Cyber Security Breach Survey 2018 Report (sponsored by the Ministry of Digital, Culture, Media and…

READ NOW →

Regulatory Compliance

3 M

GDPR privacy and cybersecurity: EU flips to the other side of the same coin

Approved this week, the European Parliament and European Commission have agreed to the Cybersecurity Act which…

READ NOW →

Threat Intelligence

3 M

Unpacking the Marriott data breach

The Marriott announcement of unauthorized access to the Starwood guest reservation database amounts to one of the…

READ NOW →

Regulatory Compliance

4 M

We stand on guard for thee: Canada's breach of security safeguards regulations

On November 1, 2018, the Canadian Breach of Security Safeguards Regulations1 of the Personal Information…

READ NOW →

Regulatory Compliance

4 M

Updates to the SEC cybersecurity guidance affect how breaches are disclosed

The U.S. Security and Exchange Commission (SEC) recently published an updated guidance for finance companies,…

READ NOW →

Cybersecurity Strategy

4 M

Insurance providers are at risk

The insurance industry is built on trust. Unfortunately, this trust can easily be lost in the event of a cyber…

READ NOW →
Page
of 3