The eSentire Blog

Managed Detection and Response

4 M

The Limitations of Managed Endpoint Detection and Response (EDR)

A Brief History of Endpoint Detection and Response (EDR): Fulfilling a NeedEmerging in the early 2010s, endpoint…

READ NOW →

Cybersecurity Strategy

4 M

Moving Forward With Innovation:

Originally posted in The Harvard Law Record April 18, 2020In a more distributed, yet interconnected world, the…

READ NOW →

Managed Detection and Response

5 M

How MSPs Can Serve Customers’ Security Needs

Originally posted in Techerati April 8, 2020 Managed service providers (MSPs) are at a crossroads in terms of…

READ NOW →

Cybersecurity Strategy

5 M

How to Update your Incident Response Playbook During a Crisis

As we (perhaps uncomfortably?) settle into the “new work from home normal” (or as I like to call it a Modified…

READ NOW →

Cybersecurity Strategy

9 M

Operating a World-Class SOC, No Matter the Circumstance

Just like every parent worries about protecting their children and caring for their extended family during these…

READ NOW →

Managed Detection and Response

3 M

The Criticality of Containment

Minimizing Dwell Time with Managed Detection and Response (MDR) I distinctly remember when the first Gartner…

READ NOW →

Threat Intelligence

3 M

Avoid Being Hit by a “Zoombomb”

This week, the eSentire Threat Intelligence team released an advisory about software vulnerabilities and the…

READ NOW →

Threat Intelligence

6 M

New BOLO: Phishing Attacks that Customize O365 Pages with Your Branding

Phishing actors continue to deploy convincing Office 365 phishing attacks by hosting pages on trusted cloud…

READ NOW →

Company News

3 M

eSentire’s Partner-First Approach Continues to Deliver

eSentire Recognized with a 5-Star Rating in the 2020 CRN® Partner Program Guide eSentire is thrilled to announce…

READ NOW →

Crisis Resources

2 M

How We Move Forward:

For those unfamiliar with the term “Forcing Function,” it’s any task, activity or event that forces one to take…

READ NOW →

Crisis Resources

3 M

Do No Harm: A Call to Arms to Stop Healthcare Cyberattacks

We are grateful for the healthcare workers around the world that are on the frontlines fighting to save lives…

READ NOW →

Crisis Resources

4 M

Pandemic Cybersecurity

One of the more disturbing things about a pandemic is the sense of helplessness it creates. Even when we ourselves…

READ NOW →
Page
of 53