Towerwall's InfoSec Blog

Content Type

See all

Towerwall's Blog named to the Best Computer Security Blogs 2016 by CreditDonkey

TrendMicro , Vormetric , Phishing , Top Computer Security Blogs 2016 , GDPR , ransomware , Compliance & Privacy , penetration testing , Compliance , Imperva , Qualys , CreditDonkey , cannabis , Fortinet , Enterprise

Michelle Drolet

We are honored to share that our blog was named as a Top Computer Security Blogs 2016 by CreditDonkey. CreditDonkey sites:

Does the NSA have a duty to disclose zero-day exploits?

zero-day , cisco , Compliance & Privacy , National Security Agency (NSA) , penetration testing , Juniper , cannabis , cybersecurity , Fortinet , Enterprise

Michelle Drolet

The NSA should disclose all zero-day exploits. But it doesn't. To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.”

Information Security Summit 2016 Raises $5,000 for MassBay Cyber Security Scholarships

Varonis , Sophos , ISACA , TCG , MassBay Community College , Michelle Drolet , Mary Shia , CDW , AlienVault , Dr. David Podell , Phishing , PhishMe , GDPR , RSA , Interwork , malware , ransomware , CyberSN , Information Security Summit , HIPAA , Compliance & Privacy , Michael Lyons , penetration testing , Compliance , SnoopWall , FTG , Veeam , ISSA , Information Security Summit Scholarship , Infraguard

Michelle Drolet

WELLESLEY HILLS, MA (August 2016) – Massachusetts Bay Community College is pleased to announce it has received a generous donation of $5,000 from this year’s annual Information Security Summit to support student scholarships in the field of cyber security. The Information Security Summit, held each year on MassBay Community College’s Wellesley Hills campus, was established in 2013 to help professionals advance their programs and knowledge base on the latest network security and technologyfalse

Hired guns: The rise of the virtual CISO

Virtual CISO , Information Systems Security Association , Fractional Chief Information Security Officer (CIS , CISO , PCI , HIPAA , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance requires the right level of expertise.

Michelle Drolet

7 Secrets of Offensive Security Please join us for a complimentary Lunch & Learn session. Tuesday, August 16 11:00 am – 1:00 pm EST Sheraton Framingham Hotel, Framingham, MA *EARN CPE CREDITS

Cybersecurity is only as strong as your weakest link—your employees

Assessment , CIS Controls 16 , CIS Controls 17 , cannabis , Enterprise

Michelle Drolet

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17 You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report. It’s good to focus on firewalls, malware defenses and data protection, butfalse

Sophos First to Introduce Always-On File Encryption for Data Shared Across Windows, Mac, iOS and Android Platforms

Sophos , Michelle Drolet , Sophos SafeGuard Encryption 8 , cannabis , Enterprise

Michelle Drolet

OXFORD, U.K., July 19, 2016 – Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced Sophos SafeGuard Encryption 8, a new synchronized encryption solution that protects data against theft from malware, attackers or accidental leaks. All organizations can now choose to adopt the best practice of "always-on" file-level encryption to protect data accessed from mobile devices, laptops, desktops, on-prem networks and cloud-based file sharing applications. Sophos is thefalse

Marijuana Industry Brings Compliance to a High Bar

The Hawaii Dispensary Alliance , Mass Department of Public Health , Drug Policy Alliance , Science and Technology Tagged With: cannabis compl , cannabis security , cannabis compliance , Compliance and Regulations , Compliance & Privacy , Compliance , State regulations , cannabis

Michelle Drolet

Ensuring overall compliance with strict regulations is the next growth opportunity. Whatever you think of it, marijuana is here to stay and coming to full legalization in a state nearest you. Controversy follows cannabis into every branch of society: political, cultural, science, health, education, legal and finance. A quick search on YouTube will show heartbreaking stories of families using marijuana to treat children with severe epilepsy. More than a hundred of these families uprooted theirfalse

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

identification , SOX , Webinar , auditing , vulnerability , Near-Term ROI , PCI , malware , Breach Prevention , HIPAA , Compliance & Privacy , Compliance , SnoopWall , Zero-day malware , patch management , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Towerwall & SnoopWall Complimentary Webinar: Breach Prevention & Near-Term ROI Tuesday, July 26 11:00am – 12:00pm EST

Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

spear phishing , BYOD , Government Compliance Regulations , Information Security Summit 2016 , malware , ransomware , Compliance & Privacy , GRC , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16 Here are some of the topics discussed at this year's summit: