The eSentire Blog

Cybersecurity Strategy

12 M

How to Create a Cybersecurity Compliance Program At Your Organization

IT and Security leaders are increasingly finding themselves under pressure to protect their sensitive data…

READ NOW →

Regulatory Compliance

4 M

Balancing Incident Disclosure and Tactical Response: Lessons from the Halliburton Breac...

On August 22, 2024, global multinational energy firm Halliburton disclosed through an 8-K form filing to the…

READ NOW →

Threat Response Unit

7 M

Welding the Weak Spots: Strengthening Manufacturing Cybersecurity Practices

As manufacturing processes integrate more deeply with digital technologies, the industry faces a dual…

READ NOW →

Threat Response Unit

11 M

Leveraging the NIST Cybersecurity Framework for Improved Threat Detection and Response

Threat detection and response are critical components of a robust cybersecurity strategy. However, simply relying…

READ NOW →

Regulatory Compliance

12 M

Navigating NIST Compliance: A Guide for Security Leaders and CISOs

As IT environments change and evolve, managing organizational risk and compliance across multiple platforms,…

READ NOW →

Cybersecurity Strategy

11 M

What Does NIS2 Directive Mean for Your Organization

In 2016, the first cybersecurity law spanning the European Union (EU) came into effect. Officially called the…

READ NOW →

Regulatory Compliance

5 M

Boosting Cybersecurity Rigor: What the SEC Expects from Public Companies

On July 26, 2023, the Securities and Exchange Commission (SEC) adopted many of the proposed cybersecurity…

READ NOW →

Sensitive Data Protection

9 M

How the New FTC Safeguards Rule Update Will Impact Auto Dealerships

On June 9th, 2023, new Federal Trade Commission (FTC) Safeguards Rule requirements will come into effect. By this…

READ NOW →

Cybersecurity Strategy

8 M

Become HIPAA Compliant Without Losing Focus from Cybersecurity

The pandemic, unending digital transformation, and unsympathetic cybercriminals have taken their toll on…

READ NOW →

Regulatory Compliance

6 M

Why HIPAA Security Rule Compliance is Challenging for Healthcare Providers

The HIPAA Security Rule can get challenging. It covers what your organization needs to do for compliance, but not…

READ NOW →

Regulatory Compliance

2 M

FTC Settles with Zoom

There’s an ingrained superstition in western culture that bad things come in threes. While “bad” is subjective and…

READ NOW →

Sensitive Data Protection

2 M

CCPA Plymouth Rock of Privacy Gets Hardened with the CPRA

A new president-elect wasn’t the only decision in California on November 3. Voters approved the California Rights…

READ NOW →
Page
of 3