The eSentire Blog

Sensitive Data Protection

3 M

CCPA Plymouth Rock of Privacy Gets Hardened with the CPRA

A new president-elect wasn’t the only decision in California on November 3. Voters approved the California Rights…

READ NOW →

Threat Response Unit

5 M

Hands-on Threat Research Leads to Resilient Zerologon Detection

Even in the all-too-plentiful world of vulnerabilities and exploits, CVE-2020-1472 (aka Zerologon) is special,…

READ NOW →

Endpoint Protection

4 M

Endpoints are the new cybersecurity front lines of defense

It seems customary now to start a blog post or report with some commentary about 2020 being a year of…

READ NOW →

Threat Response Unit

7 M

The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation

Summary: After eight long hours attempting to siege an online education institution – including initial access,…

READ NOW →

Cybersecurity Strategy

5 M

Why a Cloud-Native Platform is a Requirement for Modern Cybersecurity

If you ask anyone who works in cybersecurity what they like about their job, odds are pretty high that somewhere…

READ NOW →

Threat Intelligence

4 M

How Current Ransomware Tactics Look

You can’t rush the process of smoking a brisket, what I consider the peak of BBQ prowess. For a 15-pound brisket,…

READ NOW →

Cybersecurity Strategy

6 M

Manufacturing Cybersecurity Must Adapt to Emerging Technology and Threats

At the 2019 National Association of Manufacturers’ Board Meeting, guest speaker, Ron Moultrie leveraged his career…

READ NOW →

Incident Response

10 M

Crisis Communications For the Modern Business Landscape

This blog was created from a live webinar presented in conjunction with ILTA on 4/28/20. Access the webinar…

READ NOW →

Company News

12 M

Celebrating Women in Cybersecurity:

This morning, The Software Report revealed their Top 25 Women Leaders in Cybersecurity of 2020. I’m thrilled to…

READ NOW →

Cybersecurity Strategy

5 M

Think About Cybersecurity the Way Executives Think About Business:

Part 3 of 3 in a series on Risk Management. Click here to read Part 1 and here to read Part 2. In the final…

READ NOW →

Cybersecurity Strategy

6 M

Cybersecurity Strategy IS Risk Management:

Part 2 of 3 in a series on risk management. Click here to read Part 1 and here to read Part 3.In our continuing…

READ NOW →
8 M

It’s Time to Think About Cybersecurity the Way Executives Think About Business

Part 1 of 3 in a series on risk management. Click here to read Part 2 and here to read Part 3. In this three-part…

READ NOW →
Page
of 35