30

Apr 2019

MSSPs Need the Human Touch

Hacking has become commercial. As a result, the quality and variety of cyber threats in existence has grown significantly. While traditional, signature-based detection mechanisms have been effective in the past, they don’t scale well and new threats like fileless malware threaten to make them obsolete. On the bright side, cybersecurity researchers and developers have been working to improve the variety and quality of cybersecurity tools...

Read More


22

Apr 2019

5 Steps to Recovering from a Failed PCI ROC

A Payment Card Industry (PCI) Report on Compliance (ROC) is designed to test the effectiveness of the security controls that merchants implement to protect cardholder data. Organizations that process more than six million card transactions a year are required to undergo a ROC assessment. Other companies may be required to complete a ROC at the discretion of the card company. Failing a PCI ROC assessment...

Read More


16

Apr 2019

Understanding the Vaporworm Threat

Malware is constantly evolving as attackers develop new and more sophisticated variants to bypass or defeat enterprise network security defenses. In recent years, fileless malware has made headlines due to its ability to circumvent many of the protections used by traditional antivirus solutions. In 2019, the vaporworm threat has emerged as the next evolution of malware, combining the subtlety of fileless malware with the scalability...

Read More


10

Apr 2019

The Future of Managed Security Services

It seems like cybersecurity is moving at the speed of light. Threats and technology change on a regular basis. This makes it hard to determine the best course of action. This article explores the future of managed security services to help you decide if outsourcing your 24×7 security operations is right for your organization. What are Managed Security Services? Managed security services (MSS) refer to...

Read More


10

Apr 2019

The Weaponization of Data

Organizations collect massive amounts of data about their users. If you have a social media account, think about how much a person could learn about you just by reading your posts. Unfortunately, some organizations have figured this out, too, and use this information to their own gain. Whether a company is selling collected data, or information is illegally obtained from them through a breach, weaponization...

Read More


13

Mar 2019

Inside Crimeware-as-a-Service

In our field our customers often express disbelief in how brazen cyber criminals can be. As a “sign of the times” entrepreneurial bad actors have started commoditizing their offering in what is called crimeware-as-a-service. This article explores this disturbing trend and its implications. What is Crimeware-as-a-Service? With the introduction of cloud computing the phrase “as-a-service” has become ubiquitous. Offerings like Software-as-a-Service (SaaS) allow organizations to...

Read More


13

Mar 2019

The Changing State of Consumer Privacy

Consumer Privacy Laws With data breaches on the rise, many new data protection regulations have been enacted. The European Union’s (EU) General Data Protection Regulation (GDPR) is the first and most well-known of these. This opened a floodgate of action in the US. Several new or bolstered laws have gone into effect in the United States to protect the privacy of its citizens. GDPR Explained...

Read More


06

Mar 2019

In Time: Responding to a Cyber Incident

Cyber threat has continued to grow year over year, as made evident by the number and scale of data breaches. Organizations face a variety of cyber threats from large-scale phishing attempts to targeted attacks from cybercrime organizations and hacking groups. When a breach occurs, rapid response is critical. The longer an incident goes undetected and the greater the foothold the attacker can establish within an...

Read More


06

Mar 2019

Are You Ready for a ROC?

We recently answered the question, “How do I know if I have to be PCI compliant?”. That post is a good way for those new to the Payment Card Industry (PCI) world to learn some of the basics. Now, are you ready for a ROC? In this second installment of our three-part PCI compliance series, we will go more in depth to explain the PCI Report...

Read More


05

Mar 2019

Sword & Shield Recognized for Managed Security Services Expertise

Nationally recognized cybersecurity firm makes list of 100 top managed security service providers in the country. Knoxville, Tenn. March 5, 2019 –  Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, announced today the company has been named to the CRN® 2019 Service Provider (MSP) 500 list in the Security 100 category highlighting companies with managed security services expertise. CRN,...

Read More



Page 1 of 1612345...10...Last »