Towerwall's InfoSec Blog

Content Type

See all

Upcoming Complimentary Partner Webinars

Varonis , Sophos , Webinar , Phishing , ransomware , penetration testing , Compliance , SnoopWall , cannabis , Enterprise

Michelle Drolet

Check out one of the upcoming complimentary partner webinars:

Always be Prepared: Monitor, Analyze and Test your Security

Center for Internet Security (CIS) , Incident Response and Management , 20 Critical Security Controls , web application security , Penetration Tests , Application Software Security , open-source software , Red Team Exercises , CIS Controls , Compliance & Privacy , penetration testing , OWASP , cannabis , Enterprise

Michelle Drolet

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20 This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussedfalse

Join Towerwall & Sophos for a Ransomware Webinar

Sophos , Webinar , Intercept X , ransomware , Events , cannabis , Enterprise

Michelle Drolet

Wednesday, October 12, 2016 11:00 AM - 12:00 PM EDT Hosted by Towerwall and Sophos I am sure you are seeing the explosion of ransomware in the headlines. Businesses of every size are targets and analysts estimate ransomware is on pace to be a $1B/year crime in 2016. Sophos Intercept X is their newly released anti-exploit tool, which stops hackers at the door and prevents zero-day attacks and exploits before they hit your system. Intercept X is designed to run alongside your existing AV andfalse

Towerwall's Blog named to the Best Computer Security Blogs 2016 by CreditDonkey

TrendMicro , Vormetric , Phishing , Top Computer Security Blogs 2016 , GDPR , ransomware , Compliance & Privacy , penetration testing , Compliance , Imperva , Qualys , CreditDonkey , cannabis , Fortinet , Enterprise

Michelle Drolet

We are honored to share that our blog was named as a Top Computer Security Blogs 2016 by CreditDonkey. CreditDonkey sites:

Does the NSA have a duty to disclose zero-day exploits?

zero-day , cisco , Compliance & Privacy , National Security Agency (NSA) , penetration testing , Juniper , cannabis , cybersecurity , Fortinet , Enterprise

Michelle Drolet

The NSA should disclose all zero-day exploits. But it doesn't. To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.”

Hired guns: The rise of the virtual CISO

Virtual CISO , Information Systems Security Association , Fractional Chief Information Security Officer (CIS , CISO , PCI , HIPAA , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance requires the right level of expertise.

Michelle Drolet

7 Secrets of Offensive Security Please join us for a complimentary Lunch & Learn session. Tuesday, August 16 11:00 am – 1:00 pm EST Sheraton Framingham Hotel, Framingham, MA *EARN CPE CREDITS

Cybersecurity is only as strong as your weakest link—your employees

Assessment , CIS Controls 16 , CIS Controls 17 , cannabis , Enterprise

Michelle Drolet

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17 You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report. It’s good to focus on firewalls, malware defenses and data protection, butfalse

Sophos First to Introduce Always-On File Encryption for Data Shared Across Windows, Mac, iOS and Android Platforms

Sophos , Michelle Drolet , Sophos SafeGuard Encryption 8 , cannabis , Enterprise

Michelle Drolet

OXFORD, U.K., July 19, 2016 – Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced Sophos SafeGuard Encryption 8, a new synchronized encryption solution that protects data against theft from malware, attackers or accidental leaks. All organizations can now choose to adopt the best practice of "always-on" file-level encryption to protect data accessed from mobile devices, laptops, desktops, on-prem networks and cloud-based file sharing applications. Sophos is thefalse

Marijuana Industry Brings Compliance to a High Bar

The Hawaii Dispensary Alliance , Mass Department of Public Health , Drug Policy Alliance , Science and Technology Tagged With: cannabis compl , cannabis security , cannabis compliance , Compliance and Regulations , Compliance & Privacy , Compliance , State regulations , cannabis

Michelle Drolet

Ensuring overall compliance with strict regulations is the next growth opportunity. Whatever you think of it, marijuana is here to stay and coming to full legalization in a state nearest you. Controversy follows cannabis into every branch of society: political, cultural, science, health, education, legal and finance. A quick search on YouTube will show heartbreaking stories of families using marijuana to treat children with severe epilepsy. More than a hundred of these families uprooted theirfalse