The eSentire Blog

TRU Positive/Bulletin

3 M

Dridex Excel Spam Feature

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

SolarMarker Delivered Via Google Groups Pages

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Detection and Response

4 M

Microsoft Grows Big In Security With Partners

The cybersecurity game was never going to be the same once Microsoft made a serious play for the space, and this…

READ NOW →

TRU Positive/Bulletin

2 M

MDR for Endpoint Identifies Exploitation of Sitecore Experience Platform RCE (CVE-2021-...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

3 M

Make Security Your Star Striker, Not Your Goalie

Amid all the technical and operational challenges CISOs face, there's a major cultural obstacle to overcome too.…

READ NOW →

Threat Intelligence

1 M

CBC News: eSentire’s Mark Sangster on the Conti Ransomware Gang and Recent Healthcare C...

Mark Sangster, Vice President, Industry Security Strategies at eSentire, appeared on CBC News to speak about the…

READ NOW →

Vulnerability Scanning/Management

6 M

Adopting a Cybersecurity First Mindset: Why Organizations Should Build Cybersecurity in...

In the last year alone, businesses have been impacted by ransomware campaigns and data breaches on a global scale.…

READ NOW →

TRU Positive/Bulletin

2 M

SQUIRRELWAFFLE Malware

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Years Old Infection Discovered After Installing the eSentire MDR for Endpoint Agent

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

4 M

Ep. 6: Moving to a Risk-Based Security Approach

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Managed Detection and Response

3 M

Hughes Hubbard and Reed CIO: “eSentire MDR is so much more than MDR.”

"The nice thing with eSentire is that they’re always looking at my network, my environment, and everything that’s…

READ NOW →

Cybersecurity Strategy

5 M

6 Reasons Why Phishing and Security Awareness Training Programs Fail

The majority of devastating cyberattacks begin with a simple phishing email that tricks a user into helping the…

READ NOW →
Page
of 47