Managed Security


Managed Security Services

Managed Security News

Learn about managed security services trends and best practices. This includes AlienVault and LogRhythm SIEM as a service, phishing as a service, perimeter defense and cyber deception, security awareness programs and more.

Learn from a top managed security services company why responding to cyber incidents quickly is important and how deception and pass the hash attacks work. We also explain why MSSPs help with PCI compliance, and help you compare in-house security operations versus MSSP.


30

Apr 2019

MSSPs Need the Human Touch

Hacking has become commercial. As a result, the quality and variety of cyber threats in existence has grown significantly. While traditional, signature-based detection mechanisms have been effective in the past, they don’t scale well and new threats like fileless malware threaten to make them obsolete. On the bright side, cybersecurity researchers and developers have been working to improve the variety and quality of cybersecurity tools...

Read More


10

Apr 2019

The Future of Managed Security Services

It seems like cybersecurity is moving at the speed of light. Threats and technology change on a regular basis. This makes it hard to determine the best course of action. This article explores the future of managed security services to help you decide if outsourcing your 24×7 security operations is right for your organization. What are Managed Security Services? Managed security services (MSS) refer to...

Read More


10

Apr 2019

The Weaponization of Data

Organizations collect massive amounts of data about their users. If you have a social media account, think about how much a person could learn about you just by reading your posts. Unfortunately, some organizations have figured this out, too, and use this information to their own gain. Whether a company is selling collected data, or information is illegally obtained from them through a breach, weaponization...

Read More


06

Mar 2019

In Time: Responding to a Cyber Incident

Cyber threat has continued to grow year over year, as made evident by the number and scale of data breaches. Organizations face a variety of cyber threats from large-scale phishing attempts to targeted attacks from cybercrime organizations and hacking groups. When a breach occurs, rapid response is critical. The longer an incident goes undetected and the greater the foothold the attacker can establish within an...

Read More


05

Mar 2019

Sword & Shield Recognized for Managed Security Services Expertise

Nationally recognized cybersecurity firm makes list of 100 top managed security service providers in the country. Knoxville, Tenn. March 5, 2019 –  Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, announced today the company has been named to the CRN® 2019 Service Provider (MSP) 500 list in the Security 100 category highlighting companies with managed security services expertise. CRN,...

Read More


12

Feb 2019

Phantom Users: Deception and Pass the Hash Attacks

Deception in cyber defense Using deception in cyber defense isn’t a new concept. Honeypots, computers with false data designed to have vulnerabilities to lure attackers to keep them occupied, have been around since before the turn of the century. Honeynets, networks of honeypots intended to mimic a legitimate network, were not far behind. By providing some “low-hanging fruit” for attackers to spend their time on,...

Read More


06

Feb 2019

In-House SOC or MSSP?

With every study and high-profile data breach publicized, it becomes more apparent that companies need to make protecting their systems more diligently. This leads to the question of whether an organization should go with an in-house SOC or MSSP (managed security service provider). In this article we will discuss considerations for each. Is My Organization at Risk of Cyber Attack? A survey conducted by KPMG...

Read More


31

Jan 2019

How Managed Security Can Help Reach PCI Compliance

The PCI DSS standard is designed to ensure the security of credit card data. Any organization that stores, transmits, or processes credit card information must comply with the requirements of the PCI DSS standard. The organization must pass third-party audits designed to test this compliance. What Do I Need to Do for PCI Compliance? In order to be compliant with PCI DSS, an organization needs...

Read More


07

Jan 2019

Introduction to the MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework? MITRE’s Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework is a collection of information about advanced persistent threats (APTs) that commonly target enterprise networks. The goal of the framework is to collect all relevant and available information about these groups and organize it in a way that makes it accessible and usable for enterprise security teams. The framework was...

Read More


10

Dec 2018

Moving from Threat Intelligence Consumer to Producer

Most organizations are threat intelligence consumers, purchasing or collecting publicly available information about current cybersecurity threats. In this article, we discuss the value of becoming a threat intelligence producer and how an organization can do so with minimal in-house cybersecurity resources. What is Threat Intelligence? Threat intelligence is a term generally used to mean “any useful information for detecting and protecting against cyberattacks”.  Examples include...

Read More



Page 1 of 3123