The eSentire Blog

Cybersecurity Strategy

5 M

Ep. 4: Evidence & Building a Case

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Managed Detection and Response

2 M

Texas United CISO: “eSentire is the best decision I ever made.”

“We look at eSentire to be the experts. We trust them implicitly. One of the key differentiators I feel about…

READ NOW →

TRU Positive/Bulletin

2 M

Resurgence of ZLoader Malware Infections

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Ransomware

4 M

As Ransomware Threats Rise, the Cyber Insurance Market is Shifting Gears

Ransomware attacks, and the sophisticated threat actors and groups behind them, have evolved considerably over the…

READ NOW →

Ransomware

5 M

The Insurance Sector: Another Ripe Target for Ransomware Attacks

Within the first half of 2021, we have already seen ransomware attacks crippling many industry giants, resulting…

READ NOW →

TRU Positive/Bulletin

2 M

Solarmarker Drive-By Social Engineering Threat

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

5 M

Ep. 3: The Current Threat Environment

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Intelligence

5 M

Don’t Get Reeled into a Phishing Scam

It’s an age-old story: you open an email sent from your bank notifying you of suspicious activity in your account…

READ NOW →

AI/ML

2 M

Using a Machine Learning Threat Detection Model to Extract and Classify Malicious Macro...

Threat actors have long relied on the use of macros to create malicious documents that are emailed to unknowing…

READ NOW →

TRU Positive/Bulletin

2 M

ProxyShell Microsoft Exchange Vulnerabilities Exploited

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

5 M

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom.…

READ NOW →

Managed Detection and Response

1 M

Cyber Defense TV: Mark Sangster Hot Seat Interview

Cyber Defense TV CEO and publisher, Gary Miliefsky, put eSentire VP Mark Sangster in the Hot Seat to find out how…

READ NOW →
Page
of 53