The eSentire Blog

Regulatory Compliance

4 M

UK announces fine to mandate cybersecurity for CNI companies

The UK is proposing a hefty fine for critical national infrastructure (CNI) companies that fail to protect against…

READ NOW →

Cybersecurity Strategy

5 M

6 Questions to Assess Your Cybersecurity Strengths & Weaknesses

The Securities and Exchange Commission (SEC) recently released a report that examined 75 finance firms registered…

READ NOW →

Threat Intelligence

5 M

Digitization of patient records makes healthcare a prime cyber target

Cyber-attackers are attracted to organizations that store high-value information and have a low tolerance for…

READ NOW →

Vulnerability Scanning/Management

5 M

Cybersecurity 101: vulnerability assessment vs. penetration testing

We sat down with Eldon Sprickerhoff, Founder and Chief Security Strategist at eSentire to discuss vulnerability…

READ NOW →

Threat Intelligence

3 M

A closer look at Petya's / NotPetya's network spreading code

The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in…

READ NOW →

Threat Intelligence

5 M

Threat intelligence analysis: Petya/NotPetya malware outbreak update

eSentire has been closely monitoring the Petya/NotPetya malware outbreak this week. Our threat lab has learned…

READ NOW →

Threat Intelligence

4 M

Everything you need to know about GoldenEye

eSentire is closely monitoring the Petya (AKA GoldenEye) ransomware outbreak currently impacting businesses and…

READ NOW →

Cybersecurity Strategy

4 M

Go beyond patching: how to protect against opportunistic attacks

We recently released our Q1 Midmarket Threat Summary Report, which analyzes threat activity across multiple…

READ NOW →

Threat Intelligence

4 M

Threat summary report: why today's cybercriminals like to keep it simple

Cybercriminals have moved away from the sophisticated kinds of attacks we’ve seen in recent years. Today, they’re…

READ NOW →

Ransomware

5 M

Wannacry? our predictions for what's coming next

Last Friday, a massive ransomware attack struck organizations in at least 100 countries. The attack, named…

READ NOW →

Threat Intelligence

5 M

Cyber threats 101: how to prevent file-based malware and botnets

Malware is malicious code that’s used to obtain unrestricted access to a victim machine. This makes the ability to…

READ NOW →

Cybersecurity Strategy

6 M

Separating fact from fiction: debunking 6 cybersecurity myths in the buy-side

With over twenty years spent in tactical cybersecurity and over fifteen of them directly in the buy-side…

READ NOW →
Page
of 53