The eSentire Blog

Cybersecurity Strategy

3 M

Go beyond patching: how to protect against opportunistic attacks

We recently released our Q1 Midmarket Threat Summary Report, which analyzes threat activity across multiple…

READ NOW →

Threat Intelligence

3 M

Threat summary report: why today's cybercriminals like to keep it simple

Cybercriminals have moved away from the sophisticated kinds of attacks we’ve seen in recent years. Today, they’re…

READ NOW →

Ransomware

4 M

Wannacry? our predictions for what's coming next

Last Friday, a massive ransomware attack struck organizations in at least 100 countries. The attack, named…

READ NOW →

Threat Intelligence

4 M

Cyber threats 101: how to prevent file-based malware and botnets

Malware is malicious code that’s used to obtain unrestricted access to a victim machine. This makes the ability to…

READ NOW →

Cybersecurity Strategy

4 M

Separating fact from fiction: debunking 6 cybersecurity myths in the buy-side

With over twenty years spent in tactical cybersecurity and over fifteen of them directly in the buy-side…

READ NOW →

Cybersecurity Strategy

7 M

Navigating new terrain: law firms facing unprecedented cyber risk

Reprinted from the June 2016 issue of Cybersecurity Law & Strategy with permission. For years, various government…

READ NOW →

Cybersecurity Strategy

5 M

The enemy is inside the wire

Reprinted from the August 2016 issue of Cybersecurity Law & Strategy with permission.By now you’ve likely read…

READ NOW →

Cybersecurity Strategy

6 M

Law firms, meet your new regulator: your clients

Reprinted from the November 2016 issue of Cybersecurity Law & Strategy with permission.A couple of years ago,…

READ NOW →

Threat Intelligence

9 M

DoS 2.0

As a firm, eSentire is dedicated to delivering 24x7 managed detection and response services to mid-sized…

READ NOW →

Cybersecurity Strategy

7 M

Vuca: the cybersecurity reality

A few weeks ago I joined the eSentire Executive team at the US Military Academy at West Point for a Leadership…

READ NOW →

Threat Intelligence

13 M

Cyber threat study highlights mid-market weak spots

Cybercrime has become prolific. The complexity of attacks and the armies of threat actors driving those attacks…

READ NOW →

Company News

4 M

From Cork to Canada

Since announcing in the spring its plan to open a Security Operations Centre (SOC) in Cork, Ireland, to serve its…

READ NOW →
Page
of 47