Towerwall's InfoSec Blog

Content Type

See all

Beware the wild west of Web applications

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Security Regulations , Security Threat , Security Program , Information Security , web server , Application Security , Security , Cloud Security , Web Application Firewall , security policy , penetration testing , information security tips , Compliance , Web Browser , web users , cannabis , cybersecurity , Enterprise

Michelle Drolet

Web applications – particularly those facilitating collaboration and communication – are a boon to sales, marketing and productivity. Teams work together more effectively, salespeople enjoy better leads and marketing tools and customer service reps can more closely connect with those they serve. All of these gains, though, come at a cost: risk. By their very nature, Web applications circumvent many enterprise security controls. They are designed to enable communication, not security. A paper byfalse

U.S. Outgunned in Hacker War

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , financial security , information security tips , Compliance , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

There was a recent article in the Wall Street Journal in which the top cyber cop Shawn Henry, spoke how we are loosing the battle with the hackers. At times the hackers can keep up us all night worrying about our networks, employee actions whether intentional or not, we need to remain vigilant and on the offensive to prevent attacks. Government regulations are not going to control hackers in fact they probably will make companies less secure. Vigilance on the part of organizations will helpfalse

Event: Don't be a stooge when it comes to data security.

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Information Security , Security , security policy , Events , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Join us for an unprecedented security event! Friday, April 13th, 8:00 am - AMC Movie Theatre Framingham, MA Join Towerwall, Trend Micro, Application Security Inc., Sophos, Varonis, Vormetric and WAVE for a brief presentation on data and network security followed by a free breakfast and screening of the world premiere movie: The Three Stooges. Click here to reserve your space today! For more information, contact Andrea at 774-204-0700 or email at - andreah@towerwall.com.

Loss Of Customer Personal Information Damages Banks’ Credibility

network security , Security Services , security software , Data Security , ID Theft , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , cyber-attack , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Compliance , security research , cybersecurity , Enterprise

Michelle Drolet

On Jan. 5, federal law enforcement seized several automobiles worth about $100,000 in value. They had belonged to the former president of the Massachusetts Bank and Trust Company and were taken as restitution for his defrauding the bank in 1997. It seems that not a day passes by when news of banking-related fraud, money laundering, or a privacy violation is reported. Last year in May, Bank of America sustained a $10-million loss when an insider sold the bank’s customer data to organizedfalse