Towerwall's InfoSec Blog

Content Type

See all

Cannabis and privacy compliance: Is your health information protected?

cannabis security , cannabis compliance , HIPAA , Compliance & Privacy , Compliance , cannabis , U.S. Department of Health

Michelle Drolet

The legal regime for cannabis is a highly fractured one in the U.S. As of today, we’re approaching the legalized use of either recreational or medicinal marijuana in 30 states with eight states and the District of Columbia nearing full recreational use. Five states in the country continue to ban any use of cannabis, including for medical purposes. This discrepancy between state cannabis legal regimes creates anxiety for both users and suppliers of cannabis. Medical marijuana can be particularlyfalse

The End of Ransomware

ransomware , Compliance & Privacy , penetration testing , cannabis , Enterprise

Michelle Drolet

Everything you need to know to stop ransomware. Please join Towerwall and Sophos for an exclusive lunch and learn to learn how to stop ransomware cold. You’ll find out about:

Michelle Drolet interviewed on "Today's security challenges" in recent TechTarget E-Handbook

TechTarget , Data Security , Fractional Chief Information Security Officer (CIS , Channel Partners , cannabis , vCISO , Enterprise

Michelle Drolet

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer's specific needs.

10 things I know about... Public Wi-Fi

Hack , Social Engineering , Worcester Business Journal , Public Wi-Fi , VPN , 10 Things I Know , SSL , cannabis , Enterprise

Michelle Drolet

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers.

Protect your unstructured data with user behavior analytics

Yahoo , Varonis , NetworkWorld , CIA , behavior analytics , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

User behavior analytics sniffs out anomalies in users' actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its hacking tools via WikiLeaks. It’s ironic that the CIA’s hacking guides have been hacked, but it just goes to show how difficult it can be to prevent. Carelessly handledfalse

AlienVault announces new training: Incident Response for USM Appliance Analysts

Unified Security Management (USM) , Webinar , AlienVault , Appliance Analysts , USM , cannabis , Enterprise

Michelle Drolet

AlienVault recently announced a new addition to the AlienVault training portfolio: Incident Response for USM Appliance Analysts, a two-day course that we will start delivering Live and Online in May. AlienVault has had *many* requests from customers and MSSPs for training focused on the analysis of threats identified by the USM Appliance. This course provides security analysts with the knowledge and skills to fully leverage the AlienVault Unified Security Management (USM) Appliance to performfalse

Botnets: Is your network really protected?

ito , Michelle Drolet , Smart Home , NetworkWorld , Internet of Things , botnets , cannabis , Enterprise

Michelle Drolet

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote access and facilitates the collection of data, which is ostensibly used to make our systems “smarter.” However, it also opens new doors into our offices and homesfalse

Great article: Fraud Speak — Learn the Lingo to Beat Scammers

hackings , Phishing , ransomware , lingo , cannabis , Enterprise

Michelle Drolet

In order to stay ahead of threats, you need to know what to watch out for. This great article:

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security - Thursday, April 6, 2017

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security - Thursday, April 6, 2017

Offensive Security , InfoSec at Your Services Meetup , InfoSec at Your Services , malware , Events , SnoopWall , meetup , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Join us for our next InfoSec at Your Services Meetup: "7 Secrets of Offensive Security" by Gary Miliefsky

Michelle Drolet

Back when Apple was the plucky young upstart that dared to be different, the Mac was the machine for creative types and there was a perception that it wasn’t a target for hackers because of its cultural cool factor. You would expect the same rules to apply to the legalized marijuana market, but a major hack attack on a pot dispensary last month set that notion up in smoke. MJ Freeway, providers of popular medical marijuana tracking software, suffered a point-of-sale system hack that left overfalse