The eSentire Blog

Cybersecurity Strategy

5 M

Future thinking: technology is changing the way organizations manage IT security

eSentire has partnered with noted BBC journalist and technologist Ben Hammersley to present BlackHatWhiteHat, a…

READ NOW →

Vulnerability Scanning/Management

19 M

Vulnerability analysis: a closer look at CVE-2015-7547

This article explores the root causes of the CVE-2015-7547 vulnerability in the glibc library, and the conditions…

READ NOW →

Cybersecurity Strategy

6 M

Hunter versus gatherer: the difference between passive and active cybersecurity

The RSA Conference underscored that 2016 is the year of the hunter. The keynotes were full of references to…

READ NOW →

Attacks/Breaches

4 M

Multi-law firm security breach amplifies industry vulnerability

This week the Wall Street Journal reported that hackers had broken into the computer networks at 4 dozen leading…

READ NOW →

Cybersecurity Strategy

9 M

Cybersecurity and data breaches: how in-house counsel can engage the board

A company's board of directors has a duty to oversee all aspects of the company's risk management efforts. This…

READ NOW →

Managed Risk Programs

6 M

The developer's toolkit: understanding attacker tools and how to use them

About one year ago, I spoke with some application developers about a recent penetration test. They told me they…

READ NOW →

Cybersecurity Strategy

3 M

Notes from RSA: the tough economics bridging from prevention to detection

In his opening keynote this week, RSA President Amit Yoran emphatically delivered one key message: prevention is…

READ NOW →

Network Protection

4 M

Just another day at the office: protecting clients from complex threat networks

On Dec. 1, a large US-based cybersecurity firm received extensive international media coverage for a reported…

READ NOW →

Ransomware

4 M

Historical Data Vital to Post Breach Cybersecurity – Hilton Hotels is the Latest Exampl...

Hilton Hotels made headlines last week when it confirmed it was the victim of a security breach, which compromised…

READ NOW →

Managed Risk Programs

3 M

Phishing expedition: protect your organization from phishing exploits

Just last week, new reports revealed more damage; in addition to the library of 56 million credit card accounts,…

READ NOW →

Cybersecurity Strategy

5 M

SIEMian monkey business

If you believe deploying SIEM (Security Information and Event Management) with your perimeter security is an…

READ NOW →

Threat Intelligence

7 M

Landing the big catch: sophisticated phishing and international wire transfers

Earlier this month, networking technology and service provider Ubiquiti (NASDAQ:UBNT) filed a report with the U.S.…

READ NOW →
Page
of 53