The eSentire Blog

Cybersecurity Strategy

2 M

A Perpetual Problem

We have all seen the news articles and studies covering the “skills gap” or “talent gap” in cybersecurity. This…

READ NOW →

Threat Intelligence

2 M

2019 Post-ILTACON eSentire Recap

Disney played host last week to an international crowd of legal IT professionals at ILTACON 2019. The heat and…

READ NOW →

Cybersecurity Strategy

3 M

Understanding the Attack Life Cycle

Understanding the life cycle of an attack is a key component to being able to prevent, detect and respond.…

READ NOW →

Threat Intelligence

3 M

2019 eSentire Threat Intelligence Spotlight: Legal Industry

Five years ago, at a major legal technology conference in New York City, the topic of cybersecurity was…

READ NOW →

Threat Response Unit

3 M

Oh Snap!: New Ostap Variant Observed in the Wild

As Emotet’s apparent hiatus continues, new malspam campaigns have risen to take its place (including a strange…

READ NOW →

Cybersecurity Strategy

6 M

How to Escape the Security Arms Race and Thrive

Originally posted in Channel Futures on July 17, 2019As more applications move to the cloud, and as more…

READ NOW →

Cybersecurity Strategy

4 M

Cybersecurity for the modern manufacturing plant

Originally posted in Industry Today on July 10 ,2019Modern manufacturing faces a trinity of issues when it comes…

READ NOW →

Threat Response Unit

4 M

Threat actors using HEX encoded links to bypass phishing defenses

Overview: Recently eSentire Threat Intelligence observed an increase in credential phishing pages hosted on…

READ NOW →

Cybersecurity Strategy

6 M

Five Trends Driving Security in the Era of Emerging Tech

Originally posted in Database Trends and Applications on July 1, 2019.Nearly every week of 2018 featured headlines…

READ NOW →

Cybersecurity Strategy

4 M

For truly intelligent cyber security, pair AI with humans

Originally posted in Techerati on July 1, 2019.It’s the human plus technology combination that can truly tackle…

READ NOW →

Sensitive Data Protection

2 M

Game On: Why Hackers Hack

Theft of sensitive data, ranging from employee and customer information to intellectual property, remains at the…

READ NOW →

AI/ML

5 M

Incorporating cloud security strategies into the AI and IoT era

As seen in Risk Management on June 19, 2019Artificial intelligence (AI) and the internet of things (IoT) offer…

READ NOW →
Page
of 47