The eSentire Blog

Threat Intelligence

9 M

MD(I)R: Why Investigation is the Invisible ‘I’ in MDR

Today’s security leaders are challenged not just by a skills shortage and budgetary constraints, but by immense…

READ NOW →

Threat Response Unit

11 M

Hackers Exploit Fortinet Devices to Spread Ransomware within Corporate Environments, Warns eSentire

Summary In mid and late November 2022, eSentire detected and shut down hackers attempting to infect two of its…

READ NOW →

Managed Detection and Response

4 M

eSentire MDR for Microsoft Wins CRN 2022 Tech Innovator Award

We are thrilled to announce that CRN®, a brand of The Channel Company, has chosen eSentire, The Authority in…

READ NOW →

Third-Party Cyber Risk

6 M

Beat the Challenges of Supply Chain Vulnerability

Supply chain disruptions have had a devastating impact on the global economy. Suppliers and consumers feel the…

READ NOW →

Cybersecurity Strategy

5 M

How is the Cybersecurity Industry Shifting Gears? Three Experts Weigh In

For what seemed like the first time in a long time, cybersecurity industry professionals from around the world…

READ NOW →

Managed Detection and Response

3 M

eSentire is Part of the Gartner Peer Insights Customer First Program for Managed Detection and Response

We are excited to announce that eSentire has pledged to be a Customer First vendor in the Managed Detection and…

READ NOW →

Cybersecurity Strategy

6 M

Microsoft Rescues Acronym-Weary CISOs

For all the disruption the COVID-19 pandemic caused, it also served as a catalyst of sorts for CISOs that took…

READ NOW →

Cybersecurity Strategy

7 M

What to Know Before You Pay the Ransom

There’s no doubt that the thought of having their company featured in national headlines as a victim of yet…

READ NOW →

Threat Intelligence

6 M

How to Prepare for Cyberattacks in the Healthcare Industry

Healthcare delivery organizations, or HDOs, are an increasing target for cyberattacks. In the 2020 HIMSS…

READ NOW →

Cybersecurity Strategy

4 M

Don’t Gamble with Your Cybersecurity Budget

By Eldon Sprickerhoff, Founder and Chief Innovation Officer, eSentire When you do take your chances in a casino,…

READ NOW →

TRU Positive/Bulletin

3 M

Machine-Learning Powered BlueSteel and MDR for Endpoint Prevent Takeover by Coinmining Botnet

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

9 M

Security Operations Center (SOC): Build or Buy?

Over the past year we have witnessed some truly destructive cyber attacks occurring on a global scale. Although…

READ NOW →
Page
of 7