The eSentire Blog

Company News

2 M

Tia Hopkins Wins Outstanding Educator Leadership Award from SC MEDIA

eSentire is pleased to announce that Tia Hopkins, Vice President, Global Sales Engineering, has won an SC Media…

READ NOW →

Cybersecurity Strategy

3 M

Harvard talk on innovation: The verdict on legal tech adoption vs. associated risk

Last week, I was honored to speak at the Harvard Law School’s 2019 Legal Technology Symposium on the risks…

READ NOW →

Third-Party Cyber Risk

4 M

It’s Time to Take Third-Party Risk Seriously

Originally posted in Law.com on September 3, 2019 A recent study of 600 IT and security decision-makers revealed…

READ NOW →

Cybersecurity Strategy

2 M

A Perpetual Problem

We have all seen the news articles and studies covering the “skills gap” or “talent gap” in cybersecurity. This…

READ NOW →

Threat Intelligence

2 M

2019 Post-ILTACON eSentire Recap

Disney played host last week to an international crowd of legal IT professionals at ILTACON 2019. The heat and…

READ NOW →

Cybersecurity Strategy

3 M

Understanding the Attack Life Cycle

Understanding the life cycle of an attack is a key component to being able to prevent, detect and respond.…

READ NOW →

Threat Intelligence

3 M

2019 eSentire Threat Intelligence Spotlight: Legal Industry

Five years ago, at a major legal technology conference in New York City, the topic of cybersecurity was…

READ NOW →

Threat Response Unit

3 M

Oh Snap!: New Ostap Variant Observed in the Wild

As Emotet’s apparent hiatus continues, new malspam campaigns have risen to take its place (including a strange…

READ NOW →

Cybersecurity Strategy

6 M

How to Escape the Security Arms Race and Thrive

Originally posted in Channel Futures on July 17, 2019As more applications move to the cloud, and as more…

READ NOW →

Cybersecurity Strategy

4 M

Cybersecurity for the modern manufacturing plant

Originally posted in Industry Today on July 10 ,2019Modern manufacturing faces a trinity of issues when it comes…

READ NOW →

Threat Response Unit

4 M

Threat actors using HEX encoded links to bypass phishing defenses

Overview: Recently eSentire Threat Intelligence observed an increase in credential phishing pages hosted on…

READ NOW →

Cybersecurity Strategy

6 M

Five Trends Driving Security in the Era of Emerging Tech

Originally posted in Database Trends and Applications on July 1, 2019.Nearly every week of 2018 featured headlines…

READ NOW →
Page
of 53