The eSentire Blog

Threat Response Unit

6 M

How the Biggest Ransomware-as-a-Service (RaaS) Operators Gain Initial Access to Your Environment

Did you know that the entity that deploys ransomware in an environment may not actually be the entity that…

READ NOW →

Regulatory Compliance

13 M

Navigating NIST Compliance: A Guide for Security Leaders and CISOs

As IT environments change and evolve, managing organizational risk and compliance across multiple platforms,…

READ NOW →

Cybersecurity Strategy

5 M

2024 Cybersecurity Predictions: Navigating the Evolving Threat Landscape

As we make our way into 2024, it's clear that security leaders are navigating an increasingly complex landscape.…

READ NOW →

Managed Detection and Response

4 M

eSentire Named a Strong Performer in The Forrester Wave™: Managed Detection and Response Services in Europe Report

We are thrilled to be named a Strong Performer with a top 3 placement in The Forrester Wave™: Managed…

READ NOW →

Third-Party Cyber Risk

10 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 Threat Detection and Response

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Cybersecurity Strategy

7 M

Key Learnings from the Tempur Sealy Ransomware Attack

For members of the notorious ALPHV, also known as BlackCat, ransomware group, it’s been some great few months. For…

READ NOW →

Cybersecurity Strategy

12 M

What Does NIS2 Directive Mean for Your Organization

In 2016, the first cybersecurity law spanning the European Union (EU) came into effect. Officially called the…

READ NOW →

Managed Detection and Response

5 M

eSentire Achieves Microsoft Verified Managed XDR Solution Status

We are excited to announce that eSentire has achieved Microsoft verified Managed Extended Detection and Response…

READ NOW →

Cybersecurity Strategy

5 M

You Invested in Microsoft Office 365 E5 – Now What?

Over the past two years, organizations have been transitioning their on-premises infrastructure to the cloud…

READ NOW →

Cybersecurity Strategy

10 M

Security Capabilities CISOs Should Invest in During a Recession

The looming potential of a recession and the ongoing macroeconomic downturn suggest that many organizations will…

READ NOW →

Cybersecurity Strategy

7 M

How to Obtain Cost-Effective Cybersecurity Insurance in 2023

The last two years have brought significant upheaval in the cybersecurity insurance market, and the vast majority…

READ NOW →

Cybersecurity Strategy

9 M

Why You Should Take Advantage of Microsoft 365 Defender, the Microsoft 365 E5 Security Suite

Over the past 2-3 years, cybersecurity leaders and practitioners have faced immense pressure to keep up with the…

READ NOW →
Page
of 7