27

Sep 2016

PacketViper To Be Diamond Sponsor of EDGE2016

Leading advanced IP filtering solution provider partners with national cybersecurity conference EDGE2016 Security Conference, an emerging, world-class IT security conference is pleased to announce that PacketViper, a leading provider of advanced IP filtering software, will be a diamond level sponsor for the inaugural conference October 18-19 at the Crowne Plaza in Knoxville, Tenn. “We are proud to work alongside Sword & Shield to sponsor this...

Read More


15

Sep 2016

Need Help with HIPAA? Call an MSSP.

Because healthcare data contains so much personal – and lucrative – information, breaches into medical organizations’ networks are now the most common cyber-attack IT security professionals see. Healthcare organizations need to diligently monitor the security of their networks from both a regulatory perspective and from the perspective of what is considered best security practices. When government incentives first led healthcare organizations to adopt electronic healthcare...

Read More


13

Sep 2016

Learn to Protect Your Company from Emerging Threats

Sword & Shield Director of Managed Services Brent Cantrell will discuss “Combating Emerging Threats” at the Knoxville Chamber of Commerce’s “Bright Ideas” luncheon series Tuesday, Sept. 20. The presentation will run from 11:30 a.m. to 1 p.m. at the Chamber’s Market Square meeting room. Cyber-attacks are more stealthy and malicious than ever before and can remain unnoticed until an opportune time in the future to...

Read More


08

Sep 2016

Introducing a New Comprehensive HITRUST Solution

Nearly 90 percent of all healthcare organizations have suffered at least one data breach in the past two years with an average cost of $2.2 million per attack. Even just an allegation of a breach can result in an investigation of your organization by the U.S. Department of Health and Human Services’ Office for Civil Rights. But, for most, it is virtually impossible to claim...

Read More


01

Sep 2016

Former Vol to Emcee EDGE2016 Conference

Will Overstreet always gave the University of Tennessee Vols the EDGE by sacking the opponents’ quarterbacks. Now as the Master of Ceremonies for EDGE2016, the former linebacker-turned-entrepreneur will keep the conference running smoothly as he presents the world-class speakers to attendees. “I am very honored and excited to be emceeing the EDGE conference,” Overstreet said. “Being a former defensive end, the prospect of talking about...

Read More


31

Aug 2016

Plan your EDGE2016 Experience With the Complete Agenda

A former hacker-turned-cybercrime-expert and the first female White House Chief Information Officer will keynote EDGE2016. Now you can read more about them and the other EDGE2016 speakers on the new conference agenda page. Former White House CIO Theresa Payton, now the founder and CEO of Fortalice Solutions, will discuss why investments in cybersecurity have not eliminated attacks and breaches and how organizations can better secure their...

Read More


30

Aug 2016

ObserveIT to Sponsor EDGE2016 Cybersecurity Conference

Global provider of insider threat management software partners with national cybersecurity conference KNOXVILLE, Tenn. August 30, 2016 – EDGE2016 Security Conference, an emerging, world-class conference where complex business security problems meet real-world solutions, is pleased to announce that ObserveIT, the world’s leading provider of insider threat detection and investigation software, will be a diamond level sponsor, the highest level of sponsorship, for the inaugural conference,...

Read More


25

Aug 2016

Employees Acting as IT? Only the Shadow Knows.

Production – not malicious activity – is often the catalyst behind an employee’s use of unapproved technologies. But the proliferation of these technologies, which are easily downloaded from the Internet or cloud applications, can lead to security and compliance risks for the organization as a whole. Surveys suggest that many employees who download unapproved software or applications are simply trying to be more productive and...

Read More


23

Aug 2016

PowerShell SMB Delivery

By Russel Van Tuyl The PowerShell IEX “Download Cradle” is one of the top techniques I leverage when I have the ability to execute code on a host. This code execution typically takes place with something like PSexec.exe using recovered credentials, a successful SMBRelay attack, a malicious macro, or the payload of Java deserialization attack. The Download Cradle leverages the PowerShell Invoke-Expression cmdlet that “Runs...

Read More


23

Aug 2016

Sword & Shield Talks Ransomware in Manufacturing with Trade Magazine

Surveys indicate that manufacturing companies are the most popular target for ransomware comprising 54 percent of all hits. In the KnowBe4 survey other popular targets include: Healthcare – 44 percent Education –  35 percent Technology – 29 percent Banking – 28 percent Sword & Shield Director of Marketing and Programs Raymond Kahre talks with MFRTech about this trend. Please click to read.   Have you...

Read More



Page 1 of 4112345...102030...Last »