The eSentire Blog

Cybersecurity Strategy

6 M

Key Learnings from the Tempur Sealy Ransomware Attack

For members of the notorious ALPHV, also known as BlackCat, ransomware group, it’s been some great few months. For…

READ NOW →

Cybersecurity Strategy

11 M

What Does NIS2 Directive Mean for Your Organization

In 2016, the first cybersecurity law spanning the European Union (EU) came into effect. Officially called the…

READ NOW →

Managed Detection and Response

4 M

eSentire Achieves Microsoft Verified Managed XDR Solution Status

We are excited to announce that eSentire has achieved Microsoft verified Managed Extended Detection and Response…

READ NOW →

Cybersecurity Strategy

4 M

You Invested in Microsoft Office 365 E5 – Now What?

Over the past two years, organizations have been transitioning their on-premises infrastructure to the cloud…

READ NOW →

Cybersecurity Strategy

9 M

Security Capabilities CISOs Should Invest in During a Recession

The looming potential of a recession and the ongoing macroeconomic downturn suggest that many organizations will…

READ NOW →

Cybersecurity Strategy

6 M

How to Obtain Cost-Effective Cybersecurity Insurance in 2023

The last two years have brought significant upheaval in the cybersecurity insurance market, and the vast majority…

READ NOW →

Cybersecurity Strategy

8 M

Why You Should Take Advantage of Microsoft 365 Defender, the Microsoft 365 E5 Security ...

Over the past 2-3 years, cybersecurity leaders and practitioners have faced immense pressure to keep up with the…

READ NOW →

Threat Intelligence

8 M

MD(I)R: Why Investigation is the Invisible ‘I’ in MDR

Today’s security leaders are challenged not just by a skills shortage and budgetary constraints, but by immense…

READ NOW →

Threat Response Unit

10 M

Hackers Exploit Fortinet Devices to Spread Ransomware within Corporate Environments, Wa...

Summary In mid and late November 2022, eSentire detected and shut down hackers attempting to infect two of its…

READ NOW →

Managed Detection and Response

3 M

eSentire MDR for Microsoft Wins CRN 2022 Tech Innovator Award

We are thrilled to announce that CRN®, a brand of The Channel Company, has chosen eSentire, The Authority in…

READ NOW →

Third-Party Cyber Risk

5 M

Beat the Challenges of Supply Chain Vulnerability

Supply chain disruptions have had a devastating impact on the global economy. Suppliers and consumers feel the…

READ NOW →

Cybersecurity Strategy

4 M

How is the Cybersecurity Industry Shifting Gears? Three Experts Weigh In

For what seemed like the first time in a long time, cybersecurity industry professionals from around the world…

READ NOW →
Page
of 10