The eSentire Blog

Cybersecurity Strategy

9 M

The First 90 Days: Ensuring Success with a 30-60-90 Day Plan for New Security Leaders

The role of any security leader – be it the CISO, CIO, VP Security, or even Director of Security, is that of a…

READ NOW →

Third-Party Cyber Risk

9 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Cybersecurity Strategy

6 M

Plagued with Cyberattacks: As PE Firms Buy Up Healthcare Organizations, How to Protect ...

A variety of market, societal and economic challenges in recent years have made it harder for healthcare…

READ NOW →

Cybersecurity Strategy

6 M

Key Learnings from the Tempur Sealy Ransomware Attack

For members of the notorious ALPHV, also known as BlackCat, ransomware group, it’s been some great few months. For…

READ NOW →

Cybersecurity Strategy

11 M

What Does NIS2 Directive Mean for Your Organization

In 2016, the first cybersecurity law spanning the European Union (EU) came into effect. Officially called the…

READ NOW →

AI/ML

9 M

How ChatGPT and Other Generative AI Tools Impact Risk for Cyber Insurance Providers and...

Enterprise organizations and cyber insurance providers can't ignore generative AI technologies like ChatGPT.…

READ NOW →

Cybersecurity Strategy

6 M

Key Learnings from the Newest Verizon DBIR and the Recent Dragos Attack

Within the past month, two extremely interesting sources of attack information were made public – the 16th annual…

READ NOW →

Cybersecurity Strategy

4 M

Why Critical Infrastructure Remains a Ransomware Target

There continues to be a lot of pressure on security leaders to do more with less, but today's sophisticated and…

READ NOW →

Cybersecurity Strategy

5 M

Poor Cyber Defences Are Damaging Canada’s Economy

Cyberattacks may seem like relatively minor inconveniences to the average consumer. The reality is that such…

READ NOW →

Cybersecurity Strategy

8 M

Building a Cybersecurity Foundation to Protect Construction Firms from Ransomware Attac...

Construction firms are increasingly targets of cyber and ransomware attacks that lead to costly project delays and…

READ NOW →

Cybersecurity Strategy

6 M

Building Resiliency: Three Core Actions To Create Stronger Cybersecurity

This article is contributed by Ray Texter, Chief of Information Security at Texas United Management, and a…

READ NOW →

Third-Party Cyber Risk

6 M

Best Cybersecurity Practices for the Food Supply Sector

The food processing industry is Canada’s largest manufacturing industry in most provinces and the second largest…

READ NOW →
Page
of 14