The eSentire Blog

Threat Intelligence

4 M

Can your employees identify a phishing attack?

This article first appeared on SC Magazine UK.Phishing attacks are as popular as ever. According to report from…

READ NOW →

Attacks/Breaches

3 M

Cybercriminals strike the NHS, again

On August 25, Scotland’s third-largest National Health Service (NHS) trust was hit by malware, again. This is the…

READ NOW →

Regulatory Compliance

4 M

Equifax cybersecurity breach will trigger regulatory reform

For industry observers, watching the Equifax breach unfold is like watching a slow-motion train wreck. For nearly…

READ NOW →

Threat Intelligence

4 M

Natural disasters threaten more than just physical security

Natural disasters aren’t wholly dedicated to any single season. Tornadoes can occur at any time, but generally…

READ NOW →

Threat Intelligence

2 M

New cyber threat intelligence suggests a rise in phishing-based attacks

We’ve recently released the 2017 Q2 Threat Summary Report, which analyzes threat types, volume, and preferred…

READ NOW →

Regulatory Compliance

3 M

UK announces fine to mandate cybersecurity for CNI companies

The UK is proposing a hefty fine for critical national infrastructure (CNI) companies that fail to protect against…

READ NOW →

Cybersecurity Strategy

4 M

6 Questions to Assess Your Cybersecurity Strengths & Weaknesses

The Securities and Exchange Commission (SEC) recently released a report that examined 75 finance firms registered…

READ NOW →

Threat Intelligence

4 M

Digitization of patient records makes healthcare a prime cyber target

Cyber-attackers are attracted to organizations that store high-value information and have a low tolerance for…

READ NOW →

Vulnerability Scanning/Management

4 M

Cybersecurity 101: vulnerability assessment vs. penetration testing

We sat down with Eldon Sprickerhoff, Founder and Chief Security Strategist at eSentire to discuss vulnerability…

READ NOW →

Threat Intelligence

2 M

A closer look at Petya's / NotPetya's network spreading code

The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in…

READ NOW →

Threat Intelligence

4 M

Threat intelligence analysis: Petya/NotPetya malware outbreak update

eSentire has been closely monitoring the Petya/NotPetya malware outbreak this week. Our threat lab has learned…

READ NOW →

Threat Intelligence

3 M

Everything you need to know about GoldenEye

eSentire is closely monitoring the Petya (AKA GoldenEye) ransomware outbreak currently impacting businesses and…

READ NOW →
Page
of 47