The eSentire Blog

Managed Detection and Response

6 M

Move over SIEM, MDR will take it from here

Depending on who you ask—and no matter where they live—it’s either an open secret or an obvious truth that legacy…

READ NOW →

Threat Response Unit

6 M

The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation

Summary: After eight long hours attempting to siege an online education institution – including initial access,…

READ NOW →

Cybersecurity Strategy

5 M

The Untold History of Managed Detection and Response Part I: “Collaborative Threat Mana...

Managed Detection and Response (MDR) didn’t get a traditional naming ceremony; instead, the term was etched…

READ NOW →

Endpoint Protection

2 M

Teaming up with VMware Carbon Black to Hunt Evasive Malware

Beyond the first-order health effects of the COVID-19 and the second-order impact on the social and economic…

READ NOW →

Managed Detection and Response

8 M

Retrospective: How Managed Detection and Response Became a Cybersecurity Gamechanger

Last week, Gartner released its 2020 Market Guide for Managed Detection and Response Services. Reading the fifth…

READ NOW →

Cybersecurity Strategy

5 M

eSentire and the SEC: OCIE, EERT 2020 and Beyond

table a, table p { font-size: 1.5rem; line-height: 2rem; } In late July 2020, the Securities and…

READ NOW →

Managed Detection and Response

3 M

What Happens When Enterprise Meets Academia?

The Advanced Threat Analytics (ATA) team operates as eSentire’s advanced threat research and development branch.…

READ NOW →

Cybersecurity Strategy

4 M

Blinking In The Dark: A Day In The Life Of A CISO

Originally posted in Information Security Buzz July 23, 2020 It’s said that the devil never sleeps. Perhaps no…

READ NOW →

Threat Intelligence

7 M

Capital One Ruling

Why Capital One was forced to disclose its incident report in data breach lawsuitThis blog summarizes the webinar…

READ NOW →

Threat Intelligence

3 M

Mitigating risk and navigating the evolving cyber-threat landscape

Originally posted in teiss July 21, 2020In a globally connected world, there are few professions not affected by…

READ NOW →

Threat Intelligence

4 M

Gray War: Deterrence by Cyber Denial

In part one of “Gray War” I looked at the threats posed by gray zones looking to destabilize our economy by…

READ NOW →

Threat Intelligence

4 M

Gray War: The Cyber Cold War

For the most part, nation states or state-sponsored actors don’t generally appear on our security operations…

READ NOW →
Page
of 53