The eSentire Blog

Cybersecurity Strategy

3 M

Security buyers need to start reading the small print

It used to be that taking out those ‘essential’ policies, whether they’re for travel or car insurance, wasn’t all…

READ NOW →

Cybersecurity Strategy

5 M

Ep. 4: Evidence & Building a Case

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Intelligence

5 M

Don’t Get Reeled into a Phishing Scam

It’s an age-old story: you open an email sent from your bank notifying you of suspicious activity in your account…

READ NOW →

AI/ML

2 M

Using a Machine Learning Threat Detection Model to Extract and Classify Malicious Macro...

Threat actors have long relied on the use of macros to create malicious documents that are emailed to unknowing…

READ NOW →

Cybersecurity Strategy

5 M

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom.…

READ NOW →

Cybersecurity Strategy

3 M

How to Reduce the Impact of a Ransomware Attack

If there’s anything organizations should have learnt within the past year, it’s that cyber defenses can, and…

READ NOW →

Cybersecurity Strategy

4 M

How Your Organization Can Prevent a Ransomware Attack

It seems that every week, there are alarming headlines announcing yet another ransomware attack - evidence that…

READ NOW →

Cybersecurity Strategy

3 M

Ep. 1: Starting Out as a

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Cybersecurity Strategy

6 M

Hooked by Phisherman: Quarterbacking Breach Response with Law Enforcement

RSA Conference 2021, one of the most significant events on the cybersecurity calendar, has come and gone. We know…

READ NOW →

Cybersecurity Strategy

4 M

Better Together: How Combining MDR and IR Create Stronger Cyber Resilience

It’s impossible for businesses to participate in today’s interconnected and data-centric economy without becoming…

READ NOW →

Vulnerability Scanning/Management

7 M

7 Actionable Steps to Reducing Cyber Vulnerabilities

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Cybersecurity Strategy

6 M

Remote CyFIR Capabilities Mitigate Cyber, Business, and Health Risks of COVID-19

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →
Page
of 14