The eSentire Blog

Generative AI

8 M

Bridging the Security Gap by Addressing Visibility Challenges with Generative AI Usage

Generative AI (GenAI) technologies have become an integral part of business operations, transforming the way…

READ NOW →

Threat Response Unit

7 M

Building an Effective Threat Hunting Program for Proactive Cyber Defense

At its core, threat hunting is the practice of proactively searching for signs of malicious activities or…

READ NOW →

Threat Response Unit

12 M

Leveraging the NIST Cybersecurity Framework for Improved Threat Detection and Response

Threat detection and response are critical components of a robust cybersecurity strategy. However, simply relying…

READ NOW →

Cybersecurity Strategy

5 M

2024 Cybersecurity Predictions: Navigating the Evolving Threat Landscape

As we make our way into 2024, it's clear that security leaders are navigating an increasingly complex landscape.…

READ NOW →

Cybersecurity Strategy

10 M

The First 90 Days: Ensuring Success with a 30-60-90 Day Plan for New Security Leaders

The role of any security leader – be it the CISO, CIO, VP Security, or even Director of Security, is that of a…

READ NOW →

Third-Party Cyber Risk

10 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Cybersecurity Strategy

7 M

Plagued with Cyberattacks: As PE Firms Buy Up Healthcare Organizations, How to Protect ...

A variety of market, societal and economic challenges in recent years have made it harder for healthcare…

READ NOW →

Cybersecurity Strategy

7 M

Key Learnings from the Tempur Sealy Ransomware Attack

For members of the notorious ALPHV, also known as BlackCat, ransomware group, it’s been some great few months. For…

READ NOW →

Cybersecurity Strategy

12 M

What Does NIS2 Directive Mean for Your Organization

In 2016, the first cybersecurity law spanning the European Union (EU) came into effect. Officially called the…

READ NOW →

AI/ML

10 M

How ChatGPT and Other Generative AI Tools Impact Risk for Cyber Insurance Providers and...

Enterprise organizations and cyber insurance providers can't ignore generative AI technologies like ChatGPT.…

READ NOW →

Cybersecurity Strategy

7 M

Key Learnings from the Newest Verizon DBIR and the Recent Dragos Attack

Within the past month, two extremely interesting sources of attack information were made public – the 16th annual…

READ NOW →

Cybersecurity Strategy

5 M

Why Critical Infrastructure Remains a Ransomware Target

There continues to be a lot of pressure on security leaders to do more with less, but today's sophisticated and…

READ NOW →
Page
of 15