The eSentire Blog

Incident Response

6 M

What is Digital Forensics and How Does it Relate to Incident Response?

At eSentire we pride ourselves on being the Authority in Managed Detection and Response (MDR) services. When your…

READ NOW →

Cybersecurity Strategy

4 M

Planning Through Recovery: Five Things to Keep in Mind

Originally posted in Cloud Security Alliance March 23, 2021 Planning is everything. Just ask the Boy Scouts.…

READ NOW →

Cybersecurity Strategy

5 M

What Matters in a Managed Detection and Response (MDR) Provider?

As early as 2019, Gartner made note of the fact that there were well over 100 vendors claiming to offer Managed…

READ NOW →

Managed Detection and Response

6 M

eSentire MDR is now integrated with Microsoft Defender for Endpoint:

We now offer integrated detection, investigation and response for Microsoft Defender for Endpoint users as part of…

READ NOW →

Extended Detection and Response

5 M

eSentire Atlas XDR Cloud powers

In a recent overview of 42 Managed Detection and Response (MDR) services providers, Forrester Research recognized…

READ NOW →

Managed Detection and Response

7 M

A day in the life of our Irish Security Operations Center (SOC)

One of the things that set eSentire apart from other security service providers is our Security Operations Center…

READ NOW →

Threat Intelligence

4 M

The SolarWinds supply chain compromise (Part 2):

In our recent post about the SolarWinds “Sunburst” supply chain compromise, we examined the importance of…

READ NOW →

Threat Intelligence

4 M

2021 Drops the Cyber from Cybercrime

Well, it’s that time of year. Time for the much-ballyhooed 2021 predictions. Time to stick our collective cyber…

READ NOW →

Threat Intelligence

9 M

The SolarWinds supply chain compromise:

Even in a year as eventful as 2020, the SolarWinds supply chain breach is making headlines around the world due to…

READ NOW →

Ransomware

4 M

Understanding Modern Ransomware

A few months ago we posted The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation,…

READ NOW →

Regulatory Compliance

2 M

FTC Settles with Zoom

There’s an ingrained superstition in western culture that bad things come in threes. While “bad” is subjective and…

READ NOW →

Sensitive Data Protection

2 M

CCPA Plymouth Rock of Privacy Gets Hardened with the CPRA

A new president-elect wasn’t the only decision in California on November 3. Voters approved the California Rights…

READ NOW →
Page
of 52