08

Sep 2016

Introducing a New Comprehensive HITRUST Solution

Nearly 90 percent of all healthcare organizations have suffered at least one data breach in the past two years with an average cost of $2.2 million per attack. Even just an allegation of a breach can result in an investigation of your organization by the U.S. Department of Health and Human Services’ Office for Civil Rights. But, for most, it is virtually impossible to claim...

Read More


01

Sep 2016

Former Vol to Emcee EDGE2016 Conference

Will Overstreet always gave the University of Tennessee Vols the EDGE by sacking the opponents’ quarterbacks. Now as the Master of Ceremonies for EDGE2016, the former linebacker-turned-entrepreneur will keep the conference running smoothly as he presents the world-class speakers to attendees. “I am very honored and excited to be emceeing the EDGE conference,” Overstreet said. “Being a former defensive end, the prospect of talking about...

Read More


31

Aug 2016

Plan your EDGE2016 Experience With the Complete Agenda

A former hacker-turned-cybercrime-expert and the first female White House Chief Information Officer will keynote EDGE2016. Former White House CIO Theresa Payton, now the founder and CEO of Fortalice Solutions, will discuss why investments in cybersecurity have not eliminated attacks and breaches and how organizations can better secure their assets. She will also take the audience behind the headlines and discuss what’s not being said about...

Read More


30

Aug 2016

ObserveIT to Sponsor EDGE2016 Cybersecurity Conference

Global provider of insider threat management software partners with national cybersecurity conference KNOXVILLE, Tenn. August 30, 2016 – EDGE2016 Security Conference, an emerging, world-class conference where complex business security problems meet real-world solutions, is pleased to announce that ObserveIT, the world’s leading provider of insider threat detection and investigation software, will be a diamond level sponsor, the highest level of sponsorship, for the inaugural conference,...

Read More


25

Aug 2016

Employees Acting as IT? Only the Shadow Knows.

Production – not malicious activity – is often the catalyst behind an employee’s use of unapproved technologies. But the proliferation of these technologies, which are easily downloaded from the Internet or cloud applications, can lead to security and compliance risks for the organization as a whole. Surveys suggest that many employees who download unapproved software or applications are simply trying to be more productive and...

Read More


23

Aug 2016

PowerShell SMB Delivery

By Russel Van Tuyl The PowerShell IEX “Download Cradle” is one of the top techniques I leverage when I have the ability to execute code on a host. This code execution typically takes place with something like PSexec.exe using recovered credentials, a successful SMBRelay attack, a malicious macro, or the payload of Java deserialization attack. The Download Cradle leverages the PowerShell Invoke-Expression cmdlet that “Runs...

Read More


23

Aug 2016

Sword & Shield Talks Ransomware in Manufacturing with Trade Magazine

Surveys indicate that manufacturing companies are the most popular target for ransomware comprising 54 percent of all hits. In the KnowBe4 survey other popular targets include: Healthcare – 44 percent Education –  35 percent Technology – 29 percent Banking – 28 percent Sword & Shield Director of Marketing and Programs Raymond Kahre talks with MFRTech about this trend. Please click to read.  


10

Aug 2016

Turn Your Employees into CyberSecurity “Specialists”

Now that we know our employees are cyber security’s weakest link, what can you do to turn your employees into cyber security “specialists?” Having a strong data safety culture is one of the first rules for improving your organization’s security practices. This includes having written security policies that have been developed based on your organization’s particular needs. A Strategic Security Assessment can tell you everything...

Read More


04

Aug 2016

You are Your Company’s Worst CyberSecurity Threat

The biggest cybersecurity threat to your organization in 2016 isn’t Russian or Chinese hackers. It isn’t nefarious plots schemed by cyber spies, either. In fact, according to reports, the biggest threat to your company’s data loss is YOU. According to IBM’s CyberSecurity Intelligence Index, no less than 95 percent of all data security incidents are triggered by human error: employees who are getting tricked by...

Read More


28

Jul 2016

Compliance is not a Blueprint for Building a Security Program

For some security experts, the definition of compliance has become so skewed that it can mean just about anything to just about anyone, depending on their circumstances. Data security analysts continue to hear clients tout that they are “compliant, so that must mean we are secure,” without knowing that the more appropriate route to take is to begin with security as the framework for your...

Read More



Page 10 of 21« First...89101112...20...Last »