Managed Security


Managed Security Services

Managed Security News

Learn about managed security services trends and best practices. This includes AlienVault and LogRhythm SIEM as a service, phishing as a service, perimeter defense and cyber deception, security awareness programs and more.

Learn from a top managed security services company why responding to cyber incidents quickly is important and how deception and pass the hash attacks work. We also explain why MSSPs help with PCI compliance, and help you compare in-house security operations versus MSSP.


06

Mar 2019

In Time: Responding to a Cyber Incident

Cyber threat has continued to grow year over year, as made evident by the number and scale of data breaches. Organizations face a variety of cyber threats from large-scale phishing attempts to targeted attacks from cybercrime organizations and hacking groups. When a breach occurs, rapid response is critical. The longer an incident goes undetected and the greater the foothold the attacker can establish within an...

Read More


05

Mar 2019

Sword & Shield Recognized for Managed Security Services Expertise

Nationally recognized cybersecurity firm makes list of 100 top managed security service providers in the country. Knoxville, Tenn. March 5, 2019 –  Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, announced today the company has been named to the CRN® 2019 Service Provider (MSP) 500 list in the Security 100 category highlighting companies with managed security services expertise. CRN,...

Read More


12

Feb 2019

Phantom Users: Deception and Pass the Hash Attacks

Deception in cyber defense Using deception in cyber defense isn’t a new concept. Honeypots, computers with false data designed to have vulnerabilities to lure attackers to keep them occupied, have been around since before the turn of the century. Honeynets, networks of honeypots intended to mimic a legitimate network, were not far behind. By providing some “low-hanging fruit” for attackers to spend their time on,...

Read More


06

Feb 2019

In-House SOC or MSSP?

With every study and high-profile data breach publicized, it becomes more apparent that companies need to make protecting their systems more diligently. This leads to the question of whether an organization should go with an in-house SOC or MSSP (managed security service provider). In this article we will discuss considerations for each. Is My Organization at Risk of Cyber Attack? A survey conducted by KPMG...

Read More


31

Jan 2019

How Managed Security Can Help Reach PCI Compliance

The PCI DSS standard is designed to ensure the security of credit card data. Any organization that stores, transmits, or processes credit card information must comply with the requirements of the PCI DSS standard. The organization must pass third-party audits designed to test this compliance. What Do I Need to Do for PCI Compliance? In order to be compliant with PCI DSS, an organization needs...

Read More


07

Jan 2019

Introduction to the MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework? MITRE’s Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework is a collection of information about advanced persistent threats (APTs) that commonly target enterprise networks. The goal of the framework is to collect all relevant and available information about these groups and organize it in a way that makes it accessible and usable for enterprise security teams. The framework was...

Read More


10

Dec 2018

Moving from Threat Intelligence Consumer to Producer

Most organizations are threat intelligence consumers, purchasing or collecting publicly available information about current cybersecurity threats. In this article, we discuss the value of becoming a threat intelligence producer and how an organization can do so with minimal in-house cybersecurity resources. What is Threat Intelligence? Threat intelligence is a term generally used to mean “any useful information for detecting and protecting against cyberattacks”.  Examples include...

Read More


04

Dec 2018

Using Application Whitelisting to Stop Malware

Phishing attacks are one of the most common methods that attackers use to breach organizational defenses and gain access to the protected network. In many cases, the purpose of the phishing attack is to execute malicious software on the target computer. Developing and enforcing an application whitelist is one way that organizations can dramatically decrease the threat that these phishing attacks pose to their corporate...

Read More


20

Sep 2018

MSSP Alert names Sword & Shield to 2018 Top 100 MSSPs

Leading national cybersecurity firm ranked as a top 100 managed security services provider second year in a row KNOXVILLE, Tenn. – Sept. 20, 2018 – Sword & Shield Enterprise Security, a leading cybersecurity firm headquartered in Knoxville, Tennessee, and serving clients nationally, was named by MSSP Alert, the global voice for managed security service providers (MSSPs), to its 2018 Top 100 MSSPs list. Sword & Shield...

Read More


21

Aug 2018

Examining Fileless Malware Threats

Most malware is file-based, meaning that your computer is infected as a result of a file being downloaded and run on your computer. This makes detection and removal easier for antivirus software since it can generate signatures of the malware files and look for those files on disk to detect and remove them. Conversely, fileless malware is designed to not leave a file on disk...

Read More



Page 1 of 3123