The eSentire Blog

Threat Response Unit

9 M

The Industrialization of Cybercrime: 7 Key Statistics from eSentire's 2026 Annual Cyber...

Cyber threats are undergoing a fundamental shift in how they operate. Account compromise and identity-based…

READ NOW →

Sensitive Data Protection

9 M

Zero Trust Best Practices: Guidelines for Successful Adoption

Traditional perimeter-based security models are insufficient to protect against today’s sophisticated threat…

READ NOW →

Cybersecurity Strategy

6 M

Key Learnings from the Newest Verizon DBIR and the Recent Dragos Attack

Within the past month, two extremely interesting sources of attack information were made public – the 16th annual…

READ NOW →

Managed Detection and Response

2 M

Ep. 2: Stopping Insider Threats

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Intelligence

5 M

Living off the land: the command and control phase

This is the fifth and final blog post in the Living Off the Land blog series. In this edition, the focus is on how…

READ NOW →

Threat Intelligence

6 M

Living off the land: the exploitation phase

This is the fourth blog post in a series discussing Living Off the Land tools and techniques. Successful…

READ NOW →

Threat Intelligence

5 M

Living off the land: the delivery & installation phases

This is the third installment of the Living Off the Land blog series. This section will focus on the Delivery and…

READ NOW →

Threat Intelligence

5 M

Living off the land: the weaponization phase

This is the second blog in a series focusing on “Living Off the Land” tools. Each installment of this series…

READ NOW →