The eSentire Blog

Threat Response Unit

6 M

How Cybercriminals Customized Attacks for Five Industries in 2025

In 2025, identity-related cybercrime scaled rapidly with the expansion of "as-a-Service" models. Offering…

READ NOW →

Threat Response Unit

10 M

The Industrialization of Cybercrime: 7 Key Statistics from eSentire's 2026 Annual Cyber Threat Report

Cyber threats are undergoing a fundamental shift in how they operate. Account compromise and identity-based…

READ NOW →

Threat Response Unit

5 M

Curiosity: A Cat’s Worst Enemy, But A SOC Analyst's Best Friend

The toolkit of a Security Operations Center (SOC) Analyst should include a wide variety of tools and resources;…

READ NOW →

Third-Party Cyber Risk

4 M

Beyond Standard Protection: How eSentire's Atlas Agent Delivered Critical NPM Breach Defense

The recent NPM package repository breach sent shockwaves through the development community, with malicious…

READ NOW →

Cybersecurity Strategy

12 M

How Identity-Centric Attacks Are Threatening Mid-Market Organizations

Mid-market organizations face an escalating security crisis that traditional cybersecurity frameworks struggle to…

READ NOW →

Cybersecurity Strategy

14 M

Not Enough Security Staff? How to Bridge the Cybersecurity Talent Gap with 24/7 MDR Services

It's 2 AM on a Sunday, and your security alerts are firing. Your network monitoring system has detected suspicious…

READ NOW →

Generative AI

12 M

Model Context Protocol Security: Critical Vulnerabilities Every CISO Should Address in 2025

The rapid enterprise adoption of Model Context Protocol (MCP) represents a pivotal moment in AI security, one that…

READ NOW →

Generative AI

6 M

From months to hours: eSentire accelerates AI-augmented threat investigation with Anthropic’s Claude in Amazon Bedrock

Originally posted by AWS. Learn how eSentire amplifies elite security expertise with Anthropic’s…

READ NOW →

Managed Detection and Response

6 M

eSentire Named a Leader in The Forrester Wave™:

We are thrilled to be named a Leader in The Forrester Wave™: Managed Detection and Response Services In Europe, Q3…

READ NOW →

Generative AI

3 M

CSIRO Finds eSentire’s AI Study Demonstrates Importance of Trust & Human Empowerment in Cybersecurity Services

Trust and innovation aren’t buzzwords – they’re the backbone of effective cybersecurity in the age of…

READ NOW →

Cybersecurity Strategy

11 M

From 10,000 Alerts to 10 Stories: How Correlated Attack Chains Can Help Beat SOC Burnout

Security Operations Center (SOC) teams are drowning in a sea of alerts. According to recent research, 61% of…

READ NOW →

Cybersecurity Strategy

12 M

What to Do When Your Security Provider Gets Acquired: How to Spot the Signals and Stay Ahead of the Spin

When it comes to my career in the cybersecurity industry, I’ve been on both sides of the table during an…

READ NOW →
Page
of 11