21

Sep 2017

Sword & Shield Enterprise Security Aims to Improve Mobile App Security

National cybersecurity firm launches mobile app security assessment service to ensure businesses and entrepreneurs offer and use secure mobile applications KNOXVILLE, Tenn. Sept. 21, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, now offers detailed mobile application security assessments for Android, iOS, and Windows phone or tablet-based apps to determine their vulnerabilities and how sensitive information can...

Read More


11

Sep 2017

Sword & Shield Enterprise Security Releases White Paper on Future of Passwords

National cybersecurity firm discusses the future of password management, including the push for more user-friendly policies KNOXVILLE, Tenn. Sept. 12, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, has released a white paper, “The Future of Passwords: Perspectives for Enterprises.” Available now at https://landing.swordshield.com/new-password-guidelines-white-paper, the white paper highlights the latest National Institute of Standards and Technology (NIST)...

Read More


06

Sep 2017

Social Engineering Q&A: How to Strengthen Your Network Security

As organizations respond to InfoSec threats by hardening their network security, hackers are exploiting softer targets, such as employees and management, to gain access. According to IBM research, in 2016 about 71 percent of reported cyberattacks in the healthcare industry and 57 percent of cyberattacks in the financial services industry depended on the actions of employees who had unintentionally compromised the network security of their...

Read More


24

Aug 2017

Petya: Cyber Warfare Deception

By Ryan Ernst The following article originally appeared in the August 2017 edition of Gulf Insider online magazine. “All warfare is based upon deception.” – Sun Tzu, The Art of War Petya, the global cyberattack launched weeks after the WannaCry ransomware, appeared at first as a new variant of the original 2016 ransomware of the same name.  However, security researchers soon identified significant differences prompting...

Read More


22

Aug 2017

Reflections of an Intern: My Cybersecurity Career Path

By Tim Welles Every year at the end of Christmas break, I sit down and make a list of places where I would like to intern the upcoming summer. A summer internship at Sword & Shield Enterprise Security has been at the top of that list for the last 3 years. My first internship was focused in the IT/network operations area. While it was interesting,...

Read More


16

Aug 2017

How to Write an Effective Business Continuity Plan

By Teddy Ansink An effective business continuity plan (BCP) is proactive and aims to avoid and mitigate risks associated with a disruption of operations, including ensuring personnel and assets are protected and able to function in the event of a disaster. Due to the importance of this goal, the development of a BCP requires strategic thinking through the recognition of threats and risks facing a...

Read More


08

Aug 2017

PCI DSS Changes to Be Enforced in 2018: Are you ready?

By Jack Dempsey The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for merchants and service providers that process, store or transmit credit card information. Forward dated PCI DSS changes in Version 3.2 of the DSS requiring increased network security will be enforced in 2018. Are you ready? The most important change to the standards will be enforced beginning July 1,...

Read More


26

Jul 2017

Password Security Advice for Users and Enterprises

By Victor Garcia Password management remains a constant nuisance for users, and a security risk for businesses and organizations. There are basic steps the employees of your business can take to protect themselves and improve their password security practices. This blog offers an entry-level view of current best practices for password security; however, changes to password security policy are coming on the enterprise level. Look...

Read More


20

Jul 2017

Reverse Engineering Malware: Using Data Carving in Incident Response

Information security professionals, especially those who serve as “blue teamers” or enterprise defenders, are dealing with an evolving array of malware threats. In the blue team toolkit, one of the most important and difficult techniques is the ability to reverse engineer malware. Joe Gray, enterprise security consultant for Sword & Shield Enterprise Security, writes about his experience learning the techniques of reverse engineering malware using...

Read More



Page 1 of 1812345...10...Last »