The eSentire Blog

Cybersecurity Strategy

4 M

Better Together: How Combining MDR and IR Create Stronger Cyber Resilience

It’s impossible for businesses to participate in today’s interconnected and data-centric economy without becoming…

READ NOW →

Vulnerability Scanning/Management

7 M

7 Actionable Steps to Reducing Cyber Vulnerabilities

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Cybersecurity Strategy

6 M

Remote CyFIR Capabilities Mitigate Cyber, Business, and Health Risks of COVID-19

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Cybersecurity Strategy

2 M

Threat Hunting Cyber Risks and Safeguarding Intellectual Property in High-Risk Location...

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Threat Intelligence

3 M

How cyber resilience addresses the greatest myth in cybersecurity.

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Cybersecurity Strategy

2 M

CyFIR Internal Investigation: A Corporate Security Use Case

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Vulnerability Scanning/Management

4 M

Virtual Reality or the New Reality of Virtual Practice?

The Covid-19 pandemic forced lawyers and judges to practice outside of their physical facilities, and continue…

READ NOW →

Cybersecurity Strategy

2 M

Legal and Manufacturing Firms Must Manage Risk in the Age of Cyber threats: Cybercrime ...

Mark Sangster, VP Industry Security Strategy at eSentire, recently joined host Hillarie McClure in an episode of…

READ NOW →

Cybersecurity Strategy

7 M

Five Common Mistakes to Avoid in Digital Forensics and Incident Response (IR)

There is no such thing as perfect cybersecurity, so as business and information security professionals, we accept…

READ NOW →

Cybersecurity Strategy

4 M

Planning Through Recovery: Five Things to Keep in Mind

Originally posted in Cloud Security Alliance March 23, 2021 Planning is everything. Just ask the Boy Scouts.…

READ NOW →

Cybersecurity Strategy

5 M

What Matters in a Managed Detection and Response (MDR) Provider?

As early as 2019, Gartner made note of the fact that there were well over 100 vendors claiming to offer Managed…

READ NOW →

Cybersecurity Strategy

5 M

The Untold History of Managed Detection and Response Part I: “Collaborative Threat Mana...

Managed Detection and Response (MDR) didn’t get a traditional naming ceremony; instead, the term was etched…

READ NOW →
Page
of 15