Towerwall's InfoSec Blog

Content Type

See all

Towerwall's Latest Article "Secure Your Future with a Virtual CISO" Featured in Infosecurity Magazine

Virtual CISO , Fractional Chief Information Security Officer (CIS , Information Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below:

Known vulnerabilities pose biggest IT security threats

Misconfigurations , Internet of Things , Enterprise

Michelle Drolet

Cyber risk report cites server misconfigurations as the No. 1 vulnerability. It's often said, "There's nothing new under the sun." And that appears to be the case in the world of cybersecurity where hackers most often exploit known vulnerabilities to gain access to private computer files, according to HP's 2015 Cyber Risk Report. Maintaining strong computer security, the report says, is largely a process of plugging up known holes.

Michelle Drolet published in Web Security Journal - Know When to Onboard a Virtual CISO

Government Compliance Regulations , Virtual CISO , Fractional Chief Information Security Officer (CIS , CISO , Information Security , Compliance , vCISO , Enterprise

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Know When to Onboard a Virtual CISO" is featured in the Web Security Journal. Read more below:

Are Mobile Apps Putting Your Data at Risk?

BYOD , Mobile Devices , Information Security , Encryption , Mobile Apps , Cloud Security , Mobile Security

Michelle Drolet

Frequently, companies don’t realize that the mobile apps they use are reason for concern. Once their data is breached, they begin to investigate. However, there are telltale signs that indicate an insecure mobile app. If you know what to look for, you may be able to avoid a catastrophic data breach. Mobile apps are everywhere and their benefits are many, offering functionality, flexibility and increased productivity. These apps have altered the way we do business. Unfortunately, all of thesefalse

Throw your vendor under the bus? Not quite so fast

Security Partners , Risk Management , Assessment , Information Security , cybercriminals , Third-party Vendor , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Full rules for protecting net neutrality released by FCC

network security , FCC , Information Security , Cloud Security , Title II of the Communications Act , Compliance , Enterprise

Michelle Drolet

The US Federal Communications Commission (FCC) on Thursday lay down 400 pages worth of details on how it plans to regulate broadband providers as a public utility. These are the rules - and their legal justifications - meant to protect net neutrality. They were passed last month, and details have been eagerly anticipated. The main gist of the lengthy document released on Thursday are these three new rules:

Michelle Drolet quoted in TechTarget

network security , Information Security , Cloud Security , security policy , Mobile Security , cybersecurity

Michelle Drolet

Our Michelle Drolet is quoted in TechTarget's article "Four ways DevOps can boost AWS security". Read more below:

How to keep cybercriminals out of your apps

Application Security , penetration testing

Michelle Drolet

Four ways to implement and maintain security testing. Cybercriminals had a fantastic time in 2014 – breaching major retailers such as Home Depot and Kmart, major financial institutions (notably JPMorgan Chase), and a slew of smaller companies.

Introducing Towerwall's vCISO Services

network security , Security Services , Budget , Virtual CISO , Fractional Chief Information Security Officer (CIS , Information Security , Compliance , cybersecurity , vCISO

Michelle Drolet

Towerwall is proud to offer our new vCISO Program.

Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

ID Theft , Information Security , Application Security , Security , FBI , Hackers , Cloud Security , security policy , Security Alert , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

secuProvided by William Gallagher Associates Insurance Brokers, Inc. News broke last week that Anthem, the nation’s second-largest health insurance carrier, was the victim of a data breach by external hackers. This breach affects both current and potentially former clients of Anthem. WGA is monitoring the situation on an ongoing basis, and here is what we know at this point. Anthem is working with the FBI to determine the extent of the compromised data. To provide members with the most currentfalse