The eSentire Blog

Third-Party Cyber Risk

3 M

Beyond Standard Protection: How eSentire's Atlas Agent Delivered Critical NPM Breach De...

The recent NPM package repository breach sent shockwaves through the development community, with malicious…

READ NOW →

Generative AI

8 M

Cybersecurity Spending: Where to Allocate Your Budget in 2025

When it comes to budgeting for cybersecurity, one of the most important steps is understanding where to…

READ NOW →

Threat Response Unit

7 M

Welding the Weak Spots: Strengthening Manufacturing Cybersecurity Practices

As manufacturing processes integrate more deeply with digital technologies, the industry faces a dual…

READ NOW →

Third-Party Cyber Risk

9 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Threat Response Unit

3 M

How Cybercriminals Can Exploit Silicon Valley Bank's Collapse for Phishing Attacks

In the span of one week, countless businesses within the tech industry have been impacted by the collapse of…

READ NOW →

Third-Party Cyber Risk

6 M

Best Cybersecurity Practices for the Food Supply Sector

The food processing industry is Canada’s largest manufacturing industry in most provinces and the second largest…

READ NOW →

Third-Party Cyber Risk

4 M

The Rising Threat of Cybersecurity for Retailers

Stores across the country have their holiday lights on display and retailers everywhere are gearing up for the…

READ NOW →

Third-Party Cyber Risk

5 M

Beat the Challenges of Supply Chain Vulnerability

Supply chain disruptions have had a devastating impact on the global economy. Suppliers and consumers feel the…

READ NOW →

Third-Party Cyber Risk

13 M

What We Must Do To Create Nationally Secure And Resilient Supply Chains

With David Leichner, CMO at Cybellum Anticipate — Be proactive, control the controllables, address the ‘known…

READ NOW →

TRU Positive/Bulletin

3 M

Attackers Use Third-Party Contractor Account to Infiltrate Network

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Third-Party Cyber Risk

5 M

Policies, Prevention, and Promises: How to Protect Your Organization from Third-Party a...

Partnering with external suppliers and vendors is necessary for almost every business and can provide competitive…

READ NOW →

Vulnerability Scanning/Management

6 M

Adopting a Cybersecurity First Mindset: Why Organizations Should Build Cybersecurity in...

In the last year alone, businesses have been impacted by ransomware campaigns and data breaches on a global scale.…

READ NOW →
Page
of 2