27

Mar 2015

Dean to Speak at Memphis Cyber Security Seminar

Every organization is on some hacker’s target list and Bill Dean plans to explain why. The Sword & Shield director of computer forensics and security assessments will join other security and risk-management professionals Thursday, April 2 from 11 a.m. to 1 p.m. at Fleming’s in Memphis for a Cyber Security Seminar. The event is free, but you must register first by emailing Sandra Cannon at scannon...

Read More


16

Mar 2015

Dean to Speak at InfoSec World Conference

Sword & Shield Director of Computer Forensics and Security Assessments Bill Dean will speak about threat intelligence and cloud security at the InfoSec World Conference and Expo on Monday, March 23 from 3:15 to 4:15 p.m. and Tuesday, March 24 from 10 to 11 a.m. Dean’s threat intelligence lecture will include information on: Concerns about trust and disclosing too much privacy Understanding the value of threat intelligence...

Read More


09

Mar 2015

Another SSL/TLS vulnerability has everyone FREAKing out again.

On March 3, 2015 researchers disclosed a new secure sockets layer (SSL)/transport layer security (TLS) vulnerability (CVE-2015-0204), dubbed “FREAK”, which is an acronym for “Factoring attack on RSA-EXPORT Keys”. This vulnerability allows attackers to intercept hypertext transfer protocol secure (HTTPS) connections between a vulnerable client and server. Once the connection has been intercepted an attacker can force the connection to use ‘export-grade’ cryptography, which can...

Read More


26

Feb 2015

Don’t Learn You’ve been Breached from Your Customers. Get a DBTA Instead.

How would you like to learn that your company’s network has been breached from a customer, a business associate or even the FBI? Unfortunately, most companies – 61 percent according to the U.S. Secret Service – find out they’ve been breached from an outside source and usually months after the initial breach. Many computer security breaches occur today because of the time lag between discovery...

Read More


19

Feb 2015

Report: Cyber Thieves will Increasingly Target Healthcare Companies

Your healthcare company has data – not just any data, but Protected Healthcare Information (PHI). And, at least one report predicts that the data you have will be increasingly targeted by cyber-thieves who want that information. Healthcare records hold a cornucopia of Personally Identifiable Information (PII) that can be used in multiple follow-up attacks and various kinds of fraud. In 2013, 43 percent of all...

Read More


12

Feb 2015

Will the PCI Council Kill SSL Usage?

In a recent release of the Council’s Assessor Newsletter, which is distributed by the Payment Card Industry (PCI) council, contains an interesting paragraph that will cause some concerns among businesses that have to comply with PCI for online transactions. Notice: PCI DSS and PA-DSS v3.1 Revisions Coming In order to address a few minor updates and clarifications and one impacting change, there will be a...

Read More


09

Feb 2015

To Stop a Cyber Thief: Watch Your Data Flow

You’ve got the data and cyber thieves want it. But, if you know how your data flows, you can start controlling who has access to it and how it’s classified. “Customers look at their data and think that it’s just on their computer,” said Sword & Shield Security Analyst Rocky Breeden. “But really, that data is traversing the network and, if it’s in plain text...

Read More


06

Feb 2015

Bill Dean Discusses the Anthem Hack with the Knoxville News Sentinel

Sword & Shield’s Bill Dean discusses the recent Anthem Inc. hack with the Knoxville News Sentinel: The information that was retrieved by the hackers is “personally identifying information” and arguably more valuable than the credit card numbers stolen in recent retailer data breaches, said Bill Dean, director of forensics and security assessments at Sword & Shield Enterprise Security in Knoxville. The timespan criminals have to...

Read More


03

Feb 2015

Unpatched Adobe Flash Player Vulnerability Allows Hackers to Take Control of System

Adobe Systems warned users that hackers are exploiting another unpatched vulnerability in Flash Player, which is the third vulnerability in the past month. There are reports that the vulnerability is being actively exploited in drive-by-download attacks that target systems running Flash Player under Internet Explorer or Mozilla Firefox on Windows 8.1 and earlier, according to an Adobe alert. Adobe said in a security advisory published...

Read More


30

Jan 2015

Three Things to Know About Modern Mobile Forensics

When I started in digital forensics many years ago, the computer was “king” for the valuable information we sought for our clients. Times have definitely changed over the past few years. While computers still provide great value in our investigations, mobile devices such as tablets and smart phones are now becoming a valuable asset in many cases. We are finding that mobile devices are proving...

Read More



Page 1 of 3112345...102030...Last »