Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

ESentire

Below you will find reports with the source of “ESentire”

image from Threat Intelligence Spotlight: Protecting Your Law Firm's Data, Clients, and Reputation

Threat Intelligence Spotlight: Protecting Your Law Firm's Data, Clients, and Reputation

In this threat intelligence spotlight report, eSentire’s Threat Response Unit (TRU) provides a threat analysis of the most common cyber threat detected across our global legal customer base.

(more available)
Added: May 3, 2023
image from Disrupting Initial Access

Disrupting Initial Access

This report summarizes the ever-changing TTPs leveraged to achieve Initial Access from security incidents thwarted by eSentire’s 24/7 SOC Analysts over a two-year period between April 2020 to April 2022. Experts from out TRU team have summarized an analysis of Initial Access trends and presented recommendations on how your organization can precent attackers from establishing initial footholds and deploying malware.

(more available)
Added: February 14, 2023
image from 1H 2019 Vulnerability and Exploit Trends

1H 2019 Vulnerability and Exploit Trends

This is a summary of vulnerability trends observed and investigated by the eSentire Security Operations Center (SOC) in 1H 2019.

(more available)
Added: September 18, 2019
image from 2018 Legal Threat Report

2018 Legal Threat Report

From the one page report, “From trade secrets to client information, legal services and law firms have an ethical and legal obligation to protect privileged data. To help you understand the common attack types and trends facing the legal industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from 2018 Healthcare Threat Report

2018 Healthcare Threat Report

From this one page report, “Healthcare organizations possess some of the most valuable information exchanged on the black market, including social security numbers, patient records, financial information and intellectual property. To help you understand the common attack types and trends facing the healthcare industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from 2018 Finance Threat report

2018 Finance Threat report

This one page report offers the following, “Whether it’s account data or trading and investor information, financial firms hold a wealth of information that can be quickly turned into monetary gain. To help you understand the common attack types and trends facing the finance industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from Q1 2018 Quarterly Threat Report

Q1 2018 Quarterly Threat Report

This quarter saw a dramatic increase in attacks targeting consumer-grade routers, increasing 539% from Q4, 2017. The majority of hostile detections on the eSentire threat detection surface pertain to perimeter threats: Information Gathering, Intrusion Attempts, and Reputation Blocks. eSentire Threat Intelligence assesses with medium confidence that these detections originate, largely, from automated scanning and exploitation attempts. Threats beyond the perimeter, such as Malicious Code (+35%) and Phishing (+39%) both saw increases in the frst quarter of 2018.

(more available)
Added: February 5, 2019
image from Industry Threat Report: Healthcare

Industry Threat Report: Healthcare

This report was produced with a goal of raising awareness and educating senior decision makers about the cybersecurity issues facing the healthcare industry.

(more available)
Added: October 26, 2018
image from Incident Report: In The Nick Of Time

Incident Report: In The Nick Of Time

This short report analyzes a specific threat incident.

Added: October 25, 2018
image from 2016 Cyber Threat Study

2016 Cyber Threat Study

This study, analyzes cyber threats from the years 2014 through 2016.

Added: October 24, 2018
image from Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

This whitepaper takes a look at the cybersecurity considerations that a business traveler should keep in mind while on the move.

(more available)
Added: October 23, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The object of this report is to answer the question, what will happen in 2018?

Added: October 22, 2018
image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
image from 2017 Quarterly Threat Report Q2

2017 Quarterly Threat Report Q2

This report takes a look at the cyber threats that took place in the 2nd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 16, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from 2016 Midmarket Threat Summary Report

2016 Midmarket Threat Summary Report

This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats.

(more available)
Added: October 14, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.

Added: October 13, 2018
image from Legal Cybersecurity Checklist

Legal Cybersecurity Checklist

This whitepaper seeks to provide aid to lawfirms and their need for security compliance with their clients.

Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)