The eSentire Blog

TRU Positive/Bulletin

2 M

eSentire MDR for Endpoint Prevents Purple Fox Exploit Targeting Windows Machine

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Detection and Response

2 M

Ep. 2: Stopping Insider Threats

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

TRU Positive/Bulletin

3 M

Gootkit Identified Via Lead-Driven Threat Hunt

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

3 M

PetitPotam NTLM Relay Attack

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

3 M

How to Reduce the Impact of a Ransomware Attack

If there’s anything organizations should have learnt within the past year, it’s that cyber defenses can, and…

READ NOW →

Company News

1 M

Tia Hopkins Recognized as a 2021 IFSEC Global Influencer in Security

eSentire is proud to announce that Tia Hopkins, VP Cyber Risk Advisory and Solutions Architecture, has been…

READ NOW →

Cybersecurity Strategy

4 M

How Your Organization Can Prevent a Ransomware Attack

It seems that every week, there are alarming headlines announcing yet another ransomware attack - evidence that…

READ NOW →

Zero-Days

3 M

PrintNightmare Zero-Day Vulnerability Leaked

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

1 M

eSentire Executives Contributing to Cybersecurity Innovation across Canada

Eldon Sprickerhoff and Erin McLean join the Catalyst Cyber Accelerator as Entrepreneurs-in-Residence. The…

READ NOW →

Cybersecurity Strategy

3 M

Ep. 1: Starting Out as a

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Intelligence

1 M

Vulnerable Supply-Chain Software and George Santayana

“Those who cannot remember the past are condemned to repeat it.” It’s a fact: All non-trivial software code…

READ NOW →

Cybersecurity Strategy

6 M

Hooked by Phisherman: Quarterbacking Breach Response with Law Enforcement

RSA Conference 2021, one of the most significant events on the cybersecurity calendar, has come and gone. We know…

READ NOW →
Page
of 53