The eSentire Blog

Managed Risk Programs

2 M

Driving continuous improvements with Risk Advisory and Managed Prevention

Organizations struggle with the delicate balance between the ever-changing threat landscape and growing pressure…

READ NOW →

Threat Intelligence

3 M

Unpacking the Marriott data breach

The Marriott announcement of unauthorized access to the Starwood guest reservation database amounts to one of the…

READ NOW →

Cybersecurity Strategy

5 M

Manufacturing must adapt to emerging cybersecurity technology and threats

At the National Association of Manufacturers’ (NAM) board meeting, guest speaker Ron Moultrie leveraged his career…

READ NOW →

Regulatory Compliance

4 M

We stand on guard for thee: Canada's breach of security safeguards regulations

On November 1, 2018, the Canadian Breach of Security Safeguards Regulations1 of the Personal Information…

READ NOW →

Managed Detection and Response

1 M

Evolving MDR with artificial intelligence: the Versive acquisition

Since its inception eSentire has defined the Managed Detection and Response (MDR) category as a service offering a…

READ NOW →

Cybersecurity Strategy

5 M

SIEM: the many shades of success and failure

It’s no secret that there’s difficulty in implementing, operating and deriving business value from SIEMs. Service…

READ NOW →

Managed Detection and Response

4 M

eSentire esLog: adapting MDR for cloud workloads

Each time I attend one of the major cybersecurity conferences such as RSA or Black Hat, it is simultaneously…

READ NOW →

Managed Detection and Response

1 M

MSSPs chasing the MDR dream? The good, the bad, the ugly

If you’re up-to-date on cyber security trends, you’ve seen many traditional Managed Security Services Providers…

READ NOW →

Managed Detection and Response

2 M

The MDR difference: Rapid fire detection and containment of cyber threats

The current state of cybersecurity as it relates to the rapidly evolving threat landscape has led many…

READ NOW →

Cybersecurity Strategy

3 M

Law firms: you can't buy yourself out of risk

While no amount of insurance can protect your reputation, you also can’t buy yourself out of the cyber risks that…

READ NOW →

Threat Intelligence

2 M

eSentire observes an increase in exploitation attempts against routers

On July 19, 2018, eSentire observed an increase in exploitation attempts targeting Small-Office/Home Office (SOHO)…

READ NOW →

Threat Intelligence

5 M

Living off the land: the command and control phase

This is the fifth and final blog post in the Living Off the Land blog series. In this edition, the focus is on how…

READ NOW →
Page
of 47