The eSentire Blog

Cybersecurity Strategy

4 M

Ep. 1: Starting Out as a

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Intelligence

2 M

Vulnerable Supply-Chain Software and George Santayana

“Those who cannot remember the past are condemned to repeat it.” It’s a fact: All non-trivial software code…

READ NOW →

Cybersecurity Strategy

7 M

Hooked by Phisherman: Quarterbacking Breach Response with Law Enforcement

RSA Conference 2021, one of the most significant events on the cybersecurity calendar, has come and gone. We know…

READ NOW →

Threat Intelligence

5 M

Is History Repeating Itself with the Latest Kaseya VSA Compromise?

On July 2, 2021, REvil (a.k.a. Sodinokibi), the Russia-affiliated ransomware-as-a-service group, exploited…

READ NOW →

TRU Positive/Bulletin

3 M

Solarmarker Shifts Infrastructure in Recent Drive-By Attacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

5 M

Better Together: How Combining MDR and IR Create Stronger Cyber Resilience

It’s impossible for businesses to participate in today’s interconnected and data-centric economy without becoming…

READ NOW →

Company News

4 M

eSentire joins Canada’s Cyber. Right. Now. Campaign

Increasing number of Canadian organizations suffered cybersecurity incidents in 2020 as Canada falls behind in…

READ NOW →

TRU Positive/Bulletin

3 M

Agent Tesla Identified Using Machine Learning PowerShell Classifier

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Incident Response

3 M

eSentire Revolutionizes Incident Response Services Introducing 4-hour Remote Threat Sup...

We are thrilled to announce the launch of our Cyber Investigations Portfolio, complete with Emergency Incident…

READ NOW →

Incident Response

3 M

10 Hot Incident Response Companies To Watch In 2021

Originally published by Cybercrime Magazine Who to call when the cybercriminals get through If the famous bon…

READ NOW →

Vulnerability Scanning/Management

8 M

7 Actionable Steps to Reducing Cyber Vulnerabilities

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Cybersecurity Strategy

7 M

Remote CyFIR Capabilities Mitigate Cyber, Business, and Health Risks of COVID-19

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →
Page
of 53