The eSentire Blog

Threat Intelligence

2 M

Highlights of eSentire's 2018 Annual Threat Report

eSentire’s 2018 Year End Threat Report offers an expansive overview of the threat landscape in 2018. The content…

READ NOW →

Threat Intelligence

3 M

Depth and Breadth: Logs help empower Managed Detection and Response delivery

We’ve all heard it, “it’s not a matter of if, but when.” This phrase is a marketing staple used to instill fear,…

READ NOW →

Regulatory Compliance

3 M

GDPR privacy and cybersecurity: EU flips to the other side of the same coin

Approved this week, the European Parliament and European Commission have agreed to the Cybersecurity Act which…

READ NOW →

Managed Risk Programs

2 M

Driving continuous improvements with Risk Advisory and Managed Prevention

Organizations struggle with the delicate balance between the ever-changing threat landscape and growing pressure…

READ NOW →

Threat Intelligence

3 M

Unpacking the Marriott data breach

The Marriott announcement of unauthorized access to the Starwood guest reservation database amounts to one of the…

READ NOW →

Cybersecurity Strategy

5 M

Manufacturing must adapt to emerging cybersecurity technology and threats

At the National Association of Manufacturers’ (NAM) board meeting, guest speaker Ron Moultrie leveraged his career…

READ NOW →

Regulatory Compliance

4 M

We stand on guard for thee: Canada's breach of security safeguards regulations

On November 1, 2018, the Canadian Breach of Security Safeguards Regulations1 of the Personal Information…

READ NOW →

Managed Detection and Response

1 M

Evolving MDR with artificial intelligence: the Versive acquisition

Since its inception eSentire has defined the Managed Detection and Response (MDR) category as a service offering a…

READ NOW →

Cybersecurity Strategy

5 M

SIEM: the many shades of success and failure

It’s no secret that there’s difficulty in implementing, operating and deriving business value from SIEMs. Service…

READ NOW →

Managed Detection and Response

4 M

eSentire esLog: adapting MDR for cloud workloads

Each time I attend one of the major cybersecurity conferences such as RSA or Black Hat, it is simultaneously…

READ NOW →

Managed Detection and Response

1 M

MSSPs chasing the MDR dream? The good, the bad, the ugly

If you’re up-to-date on cyber security trends, you’ve seen many traditional Managed Security Services Providers…

READ NOW →

Managed Detection and Response

2 M

The MDR difference: Rapid fire detection and containment of cyber threats

The current state of cybersecurity as it relates to the rapidly evolving threat landscape has led many…

READ NOW →
Page
of 53