The eSentire Blog

Company News

4 M

How I Went from Climbing Cable Poles to High-End Threat Hunting

Originally posted in Cybersecurity Insiders November 26, 2019 My path to cybersecurity wasn’t a linear one. My…

READ NOW →

Managed Detection and Response

3 M

The Seven Categories of MDR - #2 - ED-Little-r (Single Telemetry)

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR)…

READ NOW →

Regulatory Compliance

5 M

Navigating the California Consumer Privacy Act

Originally posted in Corporate Compliance Insights November 12, 2019With the California Consumer Privacy Act…

READ NOW →

Managed Detection and Response

3 M

The Seven Categories of MDR - #1 - SOCaaS/Managed SIEM

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR)…

READ NOW →

Cybersecurity Strategy

4 M

Rely on Continuous Improvement and Not Biases to Apply Cybersecurity Best Practices

Originally posted on Infosecurity Magazine November 5, 2019Even with GDPR in place, high-profile breaches are…

READ NOW →

Cybersecurity Strategy

2 M

Cybersecurity is improving, but is it enough?

The one constant in our interconnected world is change. Digital transformation is dominated by nebulous…

READ NOW →

Company News

1 M

Networking, engineering and education | Cyber Work Podcast

As part of National Cybersecurity Awareness Month, Tia Hopkins, Vice President of Global Sales Engineering at…

READ NOW →

Managed Detection and Response

3 M

MDR Vendors: Separating the Players from Pretenders

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR)…

READ NOW →

Cybersecurity Strategy

2 M

Avoid the DIY Cybersecurity Trap

"Do it yourself” is an idea that has a certain romantic quality to it. It conjures up pleasant emotions and…

READ NOW →

Cybersecurity Strategy

5 M

Avoid Bad Security Buying Decisions

Originally posted on Security Boulevard on September 17, 2019Remaining competitive means staying abreast of—and…

READ NOW →

Cybersecurity Strategy

5 M

A Myopic Dystopia: Blame the Actor

Originally posted on Corporate Compliance Insights on September 27, 2019There’s a natural desire among humans to…

READ NOW →

Threat Intelligence

1 M

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

Modern malware is increasingly sophisticated. While newer antivirus solutions provide a more effective layer of…

READ NOW →
Page
of 53