Towerwall's InfoSec Blog

Content Type

See all
8 Common Pen Testing Mistakes and How to Avoid Them

8 Common Pen Testing Mistakes and How to Avoid Them

Penetration Tests , Phishing , Application Security , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

Don't Let Attackers Weaponize Fear: Use These Cyber Resilience Recommendations

cloud application security , Cyber Resilience , security information and event management (SIEM) , Application Security , Endpoint Protection , ransomware , multifactor authentication (MFA) , COVID-19 , endpoint detection , cannabis , Enterprise

Michelle Drolet

Per a recent analysis from Microsoft (via The Interpreter), every country in the world has fallen prey to at least one COVID-19-related attack. Homeland Security and the Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory back in April relating to heavy exploitation of Covid-19 by malicious cyber actors.

Michelle Drolet Shares Tech Tips on How to Get Devs Thinking About InfoSec

Secure Development Life Cycle Plan (SDLC) , Application Security , Enterprise

Michelle Drolet

In a recent article, "New Tech Project? Get Your Devs On Board Fast with These 16 Tips" published on Forbes Technology Council, Michelle Drolet shares how a Solid Secure Development Lifecycle can help:

10 (More) Free Security Tools Worth a Look

Sophos Intercept X for Mobile , Sophos XG Firewall Home Edition , Have I Been Pwned? , Phishing , GDPR , Application Security , PCI , AT&T Alien Labs Open Threat Exchange (OTX) , ransomware , HIPAA , KnowBe4 Phish-prone , Qualys Cloud Platform Community Edition , Compliance , KnowBe4 RanSim , Imperva Scuba Database Vulnerability Scanner , LogRhythm NetMon Freemium , COVID-19 , Kali Linux , cannabis , Free Security Tools , Enterprise

Michelle Drolet

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free. Maintaining security is a never-ending business. There’s so much to worry about, from misconfigured software to phishing attacks to a rapidly expanding inventory of devices with their own vulnerabilities and update requirements. We could all use a little help to stay on top of things, as we strive to assess where issues lie, protect data effectively, and test the defenses we havefalse

Michelle Drolet to Join Offit Kurman for a Cannabis InfoSec Webinar

Webinar , Zero Trust , Application Security , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Live online Friday, July 10th 12:00 – 1:00 p.m. EST Panelist include: Michelle Drolet, Towerwall & Jason Klein, Offit Kurman The threats are real and increasing daily. Learn how you can protect yourself and your cannabis company from unauthorized access to confidential files and proprietary data. By now, we are all too familiar with the real threats that cybercrime present to all businesses.. Cannabis businesses are not immune – in fact they may be more vulnerable in many ways. This talk withfalse

Save the Date: Information Security Summit - December 2020

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , ransomware , Information Security Summit , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please join us for our 8th Annual Information Security Summit! “The Evolving Threat Landscape 2020” This regional event provides participants with an update on the latest developments, trends, and status in information security. With the growing popularity of disruptive technologies, including mobility and cloud computing, social networking, and big data analytics, the accompanying data security and privacy issues become fundamental concerns.

5 Open Source Intrusion Detection Tools That Are Too Good to Ignore

Android , OSSEC , Open DLP , Phishing , Data Loss Prevention (DLP) , Application Security , Snort , malware , Bro , Windows , Kismet , iOS , cannabis , Enterprise , Open Source

Michelle Drolet

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options. As cybersecurity professionals, we try to prevent attackers from gaining access to our networks but protecting perimeters that have grown exponentially with the rise of mobile devices, distributed teams, and the internet of things (IoT) is not easy. The unpalatable truth isfalse

Trends in Data Breaches and Comprehensive Response

Social Engineering , Webinar , Business Continuity , Michelle Drolet , CCPA , GDPR , Application Security , BrightTalk , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

Trends in Data Breaches and Comprehensive Responses Does your organization have a data breach response plan? Join Michelle Drolet and a team of industry experts for an interactive Q&A panel and discover the best practices for breach response and how to strengthen your organization's cyber resilience.

8 Security Strategies for Unmanaged Devices

8 Security Strategies for Unmanaged Devices

Business Continuity , Armis , IoT security , Application Security , European General Data Protection Regulation (GDPR) , Compliance , IoT , cannabis , Enterprise

Michelle Drolet

Click Here to Watch the Webinar Now >

Application security is maturing, but independent testing is crucial

Open Web Application Security Project (OWASP) , appsec , Application Security , independent testing , OWASP , cannabis , vCISO , Enterprise

Michelle Drolet

Skills shortage is making shift to continuous appsec testing challenging. While application security (appsec) is firmly on the radar, most organizations still have a way to go before they can be confident about how secure their apps are. Devops is accelerating the speed of development and, coupled with the shift to the cloud, it’s creating many challenges for appsec. Breaking down walls between security, development and business units is easier said than done and the security skills shortagefalse