20

Jul 2017

Reverse Engineering Malware: Using Data Carving in Incident Response

Information security professionals, especially those who serve as “blue teamers” or enterprise defenders, are dealing with an evolving array of malware threats. In the blue team toolkit, one of the most important and difficult techniques is the ability to reverse engineer malware. Joe Gray, enterprise security consultant for Sword & Shield Enterprise Security, writes about his experience learning the techniques of reverse engineering malware using...

Read More


28

Jun 2017

Petya Ransomware: Older Malware, New Dangerous Techniques

by Joe Gray On June 27, 2017, the world experienced another outbreak of Petya ransomware. This article details the background of this threat and provides information on the new variant, as well as ways to prevent getting infected. Ransomware Background Ransomware is a class of malicious software that takes infected systems hostage and demands a “ransom” to unlock the system or systems. To further complicate...

Read More


07

Jun 2017

Sword & Shield Enterprise Security Makes CRN 2017 Solution Provider 500 List 10th Year in a Row

Leading national cybersecurity firm continues placement in CRN 2017 Solution Provider 500, the annual ranking of the largest and most successful North American solution providers KNOXVILLE, Tenn. – June 7, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named by CRN®, a brand of The Channel Company, to the CRN 2017 Solution Provider 500 list, an annual...

Read More


19

May 2017

InfoSec Threats Spread Worldwide

By Ryan Ernst InfoSec threats are a global concern. Well-publicized cyberattacks in the U.S. are only one chapter in a worldwide cyberwar. History of attacks in the Middle East The Middle East is one theater in that war. Back in 2012, Shamoon, a computer virus designed for sabotage and corporate espionage, was unleashed on Saudi Aramco, a Saudi Arabian petroleum company, in 2012. The attack wiped out...

Read More


15

May 2017

WannaCry Ransomware: Dangerously Different

By Jason Matlock Friday, May 12, 2017, will be remembered for what was the largest ransomware attack in internet history. The world watched as critical systems were affected by a piece of ransomware called WannaCry or Wcry for short. By the time the dust settled, more than 200,000 computers in 150 different countries were infected by WannaCry ransomware. Thanks to a security researcher named MalwareTech,...

Read More


15

May 2017

WannaCry Ransomware: Protect Yourself with These Steps

By Rick Cantrell By now much of the world has heard about the WannaCry Ransomware attack that hit Friday afternoon and continued to wreak havoc globally into the weekend. Following are details of this threat and what you can do to protect yourself.  The WannaCry Ransomware exploit is attacking a known vulnerability in SMBv1 on Microsoft products. In order to protect yourself, be sure to keep all...

Read More


09

May 2017

Sword & Shield Enterprise Security Helping to Raise $4,200 for Laundry Love: Knoxville

Leading national cybersecurity firm aims to help raise money to support local program designed to ease the burden of laundry care for struggling families  KNOXVILLE, Tenn. – May 9, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, is sponsoring Laundry Love: Knoxville, in cooperation with Knoxville Pays It Forward, which hosts a free laundry event from 6-8...

Read More


25

Apr 2017

Shadow Brokers Release: Microsoft Exploits and Your Business

By Jason Graf It seems like something out of a spy novel: A covert band of cybercriminals releases details of extraordinary weaknesses in unsupported versions of Windows that could be used to wreak havoc on businesses and individuals worldwide. The Shadow Brokers release is real, and it has the potential to cause serious damage. On April 14, the Shadow Brokers, a hacker group originating in...

Read More


05

Apr 2017

The ROI of Security Assessments

In the business world, Return on Investment (ROI) is used to evaluate an expense and is calculated by dividing the return (benefit) of an investment by the cost of the investment. This means a higher ROI represents a better investment. In a situation where the return and cost are tangible and easily measured, calculating ROI is not difficult. Unfortunately, calculating ROI for a security assessment...

Read More


27

Mar 2017

Insider Threats and What They Mean for your Business

Companies are spending more on information security solutions than ever before, but do they know the threats that can come from within their own organizations? While all eyes turn toward the looming information security threats from outside, sometimes the biggest risk is insider threats coming from an otherwise trusted employee. The information in this article originally appeared in a blog post written by Joe Gray, enterprise...

Read More



Page 1 of 1812345...10...Last »