eSentire (@esentire) 's Twitter Profile
eSentire

@esentire

The Authority in Managed Detection and Response. We hunt, investigate, and stop threats before they disrupt your business. Visit esentire.com/blog

ID: 42697059

linkhttp://www.esentire.com/ calendar_today26-05-2009 19:23:03

15,15K Tweet

6,6K Followers

1,1K Following

eSentire (@esentire) 's Twitter Profile Photo

⏱️ 14 minutes. That’s how fast our SOC stopped a ransomware attack targeting an engineering firm. Unauthorized RDP access. Defender exclusions added. Lateral movement underway. How did we shut it down and what made the difference? 🎥 Watch the full story below!

eSentire (@esentire) 's Twitter Profile Photo

Could a QR code in a Word file steal your credentials? 📂➡️📱 Attackers are using corrupted Word files to bypass antivirus tools and lead users to phishing sites. 📌 Tip: Train teams to spot phishing emails & monitor QR code-based threats 🔗 Learn more: bit.ly/4flWiKR

eSentire (@esentire) 's Twitter Profile Photo

Regulators demand compliance. Attackers demand resilience. Can your program deliver both? ⚖️ Key steps: 🔹 Assess risks & gaps 🔹 Align with NIST/ISO frameworks 🔹 Automate reporting 🔹 Build security into compliance 🔗 Learn more here: bit.ly/49IYPO8

Regulators demand compliance. Attackers demand resilience. Can your program deliver both? ⚖️

Key steps:
🔹 Assess risks & gaps
🔹 Align with NIST/ISO frameworks
🔹 Automate reporting
🔹 Build security into compliance

🔗 Learn more here: bit.ly/49IYPO8
eSentire (@esentire) 's Twitter Profile Photo

Unlimited logs without context can overwhelm teams and obscure threats. Consider: 🔹 More data ≠ better visibility 🔹 Context is key to avoid alert fatigue 🔹 Filter noise to enable faster responses 🔗 Understand the nuances of ‘unlimited logs’ here: bit.ly/3Bmp401

eSentire (@esentire) 's Twitter Profile Photo

Your endpoint and cloud gaps are ransomware opportunities. 🔹 Out-of-scope endpoints often start ransomware attacks 🔹 Stolen credentials & misconfigs enable lateral moves Learn how to defend against ransomware in our white paper with @Crowdstrike: bit.ly/3ZrmOxu

Your endpoint and cloud gaps are ransomware opportunities.

🔹 Out-of-scope endpoints often start ransomware attacks
🔹 Stolen credentials & misconfigs enable lateral moves

Learn how to defend against ransomware in our white paper with @Crowdstrike: bit.ly/3ZrmOxu
eSentire (@esentire) 's Twitter Profile Photo

New CISO? Here’s your playbook: 🔹 Compliance: Start with a maturity assessment; align with NIST. 🔹 Board Buy-In: Show ROI by linking security to business goals. 🔹 Prevent Gaps: Use MDR for 24/7 threat detection. 🔹 Incident Response: Prep IR tools to minimize downtime.

New CISO? Here’s your playbook:

🔹 Compliance: Start with a maturity assessment; align with NIST.
🔹 Board Buy-In: Show ROI by linking security to business goals.
🔹 Prevent Gaps: Use MDR for 24/7 threat detection.
🔹 Incident Response: Prep IR tools to minimize downtime.
eSentire (@esentire) 's Twitter Profile Photo

After a long day at RSA Conference 2025, kick off your boots and join us for a Next Level Happy Hour — cowboy style. We’re serving up whiskey, barbecue, and good vibes. 🪪 Must bring your RSA badge! 🎟️ Space is limited, so make sure you register: buff.ly/CIAYcaz

After a long day at <a href="/RSAConference/">RSA Conference</a> 2025, kick off your boots and join us for a Next Level Happy Hour — cowboy style. 

We’re serving up whiskey, barbecue, and good vibes.

🪪 Must bring your RSA badge!
🎟️ Space is limited, so make sure you register: buff.ly/CIAYcaz
eSentire (@esentire) 's Twitter Profile Photo

When someone close to you is hit by a phishing scam, what do you you? 🎣 If you're Glen Schut, you get into cyber 🛡️ As our SOC Innovation Manager, Glen uses GenAI, LLMs, and P3 to transform threat investigations and outpace cybercriminals. 🎥 Watch his story below!

eSentire (@esentire) 's Twitter Profile Photo

Confused by MDR pricing? You’re not alone. Here are the key factors that impact #MDR pricing: 💻 Number of endpoints 🛡️ Type of coverage (network, endpoint, cloud) 🎯 Response capabilities 👾 Add-ons like threat-hunting 🔗 Read more here: bit.ly/3VGUhC0

Confused by MDR pricing? You’re not alone.

Here are the key factors that impact #MDR pricing:

💻 Number of endpoints
🛡️ Type of coverage (network, endpoint, cloud)
🎯 Response capabilities
👾 Add-ons like threat-hunting

🔗 Read more here: bit.ly/3VGUhC0
eSentire (@esentire) 's Twitter Profile Photo

Cybercriminals see SMBs as easy prey. 💪 Here’s how to fight back: 🔹 24/7 threat monitoring stops attacks early 🔹 Robust endpoint security ensures visibility 🔹 MFA & least privilege close access gaps Learn more in our white paper with CrowdStrike: bit.ly/3ZpHPJ5

Cybercriminals see SMBs as easy prey. 

💪 Here’s how to fight back:

🔹 24/7 threat monitoring stops attacks early
🔹 Robust endpoint security ensures visibility
🔹 MFA &amp; least privilege close access gaps

Learn more in our white paper with <a href="/CrowdStrike/">CrowdStrike</a>: bit.ly/3ZpHPJ5
eSentire (@esentire) 's Twitter Profile Photo

Ransomware thrives in sectors that can’t afford disruption. 🔹 Healthcare: Patient data & critical systems = high stakes. 🔹 Manufacturing: Supply chain disruptions cost millions. 🔹 Technology: IP & cloud dependencies = prime targets. 📊 Learn more: bit.ly/3ZsvFPK

Ransomware thrives in sectors that can’t afford disruption. 

🔹 Healthcare: Patient data &amp; critical systems = high stakes.
🔹 Manufacturing: Supply chain disruptions cost millions.
🔹 Technology: IP &amp; cloud dependencies = prime targets.

📊 Learn more: bit.ly/3ZsvFPK
eSentire (@esentire) 's Twitter Profile Photo

Rick Mischka from AVANT interviewed our very own (Ya)Tia Hopkins to discuss how cyber resilience is redefining business continuity 💡🔒 Tune in for insights on CTEM, mitigating risks, and more. 🎧 Listen here: bit.ly/3ANUhbZ

Rick Mischka from <a href="/Avant_CCC/">AVANT</a> interviewed our very own <a href="/yhopkins/">(Ya)Tia Hopkins</a> to discuss how cyber resilience is redefining business continuity 💡🔒

Tune in for insights on CTEM, mitigating risks, and more. 

🎧 Listen here: bit.ly/3ANUhbZ
eSentire (@esentire) 's Twitter Profile Photo

It’s almost time to wrangle the risks and raise a glass! 🤠 After a packed day at #RSAC2025, join us for a Next Level Happy Hour — cowboy style! We’re bringing the whiskey, BBQ, and chill vibes to The Peace Lounge at Hotel Zeppelin. Grab your spot now: bit.ly/4jl2zbV

It’s almost time to wrangle the risks and raise a glass! 🤠

After a packed day at #RSAC2025, join us for a Next Level Happy Hour — cowboy style!

We’re bringing the whiskey, BBQ, and chill vibes to The Peace Lounge at Hotel Zeppelin.

Grab your spot now: bit.ly/4jl2zbV
eSentire (@esentire) 's Twitter Profile Photo

Why are we still treating cybersecurity like an IT problem? 🎙️ On the latest episode of Next Level CISO, Craig Peppard, VP & CISO at @Ivari_Canada discusses the longstanding misconception that infosec belongs solely to the IT department. 👉 Listen now: buff.ly/5i7bUEf

Why are we still treating cybersecurity like an IT problem? 🎙️ 

On the latest episode of Next Level CISO, Craig Peppard, VP &amp; CISO at @Ivari_Canada discusses the longstanding misconception that infosec belongs solely to the IT department.

👉 Listen now: buff.ly/5i7bUEf
eSentire (@esentire) 's Twitter Profile Photo

Identity is the #1 attack vector – but many orgs still rely on siloed tools that only detect threats 🚨 Integrating #ITDR within #MDR workflows enables faster, more precise response across identity, endpoint, and cloud. Here’s how it works: buff.ly/l44BMpM

Identity is the #1 attack vector – but many orgs still rely on siloed tools that only detect threats 🚨 

Integrating #ITDR within #MDR workflows enables faster, more precise response across identity, endpoint, and cloud.

Here’s how it works: buff.ly/l44BMpM
eSentire (@esentire) 's Twitter Profile Photo

💰 A single cyber gap can cost millions or kill an M&A deal. On this episode of Next Level CISO podcast, Greg Crowley & Dwayne Smith share how security gaps impact valuation, key CISO actions post-acquisition and more cyber M&A tips. 🎧 Listen now buff.ly/QGPLba2

💰 A single cyber gap can cost millions or kill an M&amp;A deal.

On this episode of Next Level CISO podcast, Greg Crowley &amp; Dwayne Smith share how security gaps impact valuation, key CISO actions post-acquisition and more cyber M&amp;A tips. 

🎧 Listen now buff.ly/QGPLba2
eSentire (@esentire) 's Twitter Profile Photo

💡 Still have some room in your 2025 budget? Ransomware, AI-powered attacks, and credential theft are rising threats for 2025. 🔒 Time to focus your budget on 24/7 MDR, behavioral analytics, and security awareness training. Full insights here: bit.ly/3YrdV6C

💡 Still have some room in your 2025 budget?  

Ransomware, AI-powered attacks, and credential theft are rising threats for 2025. 

🔒 Time to focus your budget on 24/7 MDR, behavioral analytics, and security awareness training. 

Full insights here:  bit.ly/3YrdV6C
eSentire (@esentire) 's Twitter Profile Photo

Congratulations Ashlyn McLean for being named to CRN's Women of the Channel list for the fourth time! 🎉 As our VP of Global Partner Experience, Ashlyn is responsible for leading strategy execution of our partner programs globally. Learn more: buff.ly/eZAZqs3 #WOTC25

Congratulations Ashlyn McLean for being named to CRN's Women of the Channel list for the fourth time! 🎉

As our VP of Global Partner Experience, Ashlyn is responsible for leading strategy execution of our partner programs globally.

Learn more: buff.ly/eZAZqs3 

#WOTC25
eSentire (@esentire) 's Twitter Profile Photo

You can’t afford guesswork at 2AM. 🥱 That’s why security leaders choose partners who show up every hour and every incident. See why top security pros choose eSentire: buff.ly/ZIYQnBo

You can’t afford guesswork at 2AM. 🥱 

That’s why security leaders choose partners who show up every hour and every incident.

See why top security pros choose eSentire: buff.ly/ZIYQnBo
eSentire (@esentire) 's Twitter Profile Photo

The MDR market has been busy shouting “AI! AI!” And, we were too busy driving results to get on the megaphone - our bad. Our AI is fully deployed, expert-driven, and redefines SecOps. Learn more about how we’re protecting what’s next. 📖 Read more: esentire.com/ai-you-can-tru…