The eSentire Blog

Threat Intelligence

9 M

The SolarWinds supply chain compromise:

Even in a year as eventful as 2020, the SolarWinds supply chain breach is making headlines around the world due to…

READ NOW →

Ransomware

4 M

Understanding Modern Ransomware

A few months ago we posted The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation,…

READ NOW →

Regulatory Compliance

2 M

FTC Settles with Zoom

There’s an ingrained superstition in western culture that bad things come in threes. While “bad” is subjective and…

READ NOW →

Sensitive Data Protection

2 M

CCPA Plymouth Rock of Privacy Gets Hardened with the CPRA

A new president-elect wasn’t the only decision in California on November 3. Voters approved the California Rights…

READ NOW →

Company News

3 M

Six Consecutive Years on Deloitte’s Technology Fast 500 List—What Does it Mean?

Earlier today we proudly announced that eSentire was named to the prestigious Deloitte Technology Fast 500 list—a…

READ NOW →

Managed Detection and Response

6 M

The Untold History of Managed Detection and Response Part III: Looking Ahead

Note: This post is the final part of The Untold History of MDR; if you haven’t done so yet, be sure to check out…

READ NOW →

Threat Response Unit

4 M

Hands-on Threat Research Leads to Resilient Zerologon Detection

Even in the all-too-plentiful world of vulnerabilities and exploits, CVE-2020-1472 (aka Zerologon) is special,…

READ NOW →

Managed Detection and Response

6 M

The Untold History of Managed Detection and Response Part II: Nerds at Work

Note: This post is part two of The Untold History of MDR; if you haven’t done so yet, be sure to check out Part I:…

READ NOW →

Endpoint Protection

3 M

Endpoints are the new cybersecurity front lines of defense

It seems customary now to start a blog post or report with some commentary about 2020 being a year of…

READ NOW →

Managed Detection and Response

6 M

Move over SIEM, MDR will take it from here

Depending on who you ask—and no matter where they live—it’s either an open secret or an obvious truth that legacy…

READ NOW →

Threat Response Unit

6 M

The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation

Summary: After eight long hours attempting to siege an online education institution – including initial access,…

READ NOW →

Cybersecurity Strategy

5 M

The Untold History of Managed Detection and Response Part I: “Collaborative Threat Mana...

Managed Detection and Response (MDR) didn’t get a traditional naming ceremony; instead, the term was etched…

READ NOW →
Page
of 47