Towerwall's InfoSec Blog

Content Type

See all

Deciding Between Vulnerability Scanning And Penetration Testing

Security Services , security software , Data Security , Assessment , Security Regulations , Security Threat , Information Security , Application Security , Security , Hackers , security policy , cybercriminals , penetration testing , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test at least once a year. These are the minimum requirements to remain compliant; it is prudent to scan and test more often.false

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Data Security Review Issue 2: Know the Threats

Data Security , Security Threat , Information Security , Security , Hackers , cybercriminals , Security Alert , Data Privacy , Data Breach

Michelle Drolet

Welcome to Issue 2 of the Data Security Review

Towerwall Heartbleed Vulnerability Alert

network security , Data Security , Security Regulations , Heartbleed , credit card security , Security Threat , Information Security , Security , security policy , cybercriminals , penetration testing , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Good Afternoon: The IT infrastructure your organization may use for day-to-day business may be vulnerable because of the Heartbleed vulnerability. Sophos a Towerwall partner has prepared a podcast of the Heartbleed vulnerability, which addresses who is likely affected, workarounds and an offer to help determine if you are vulnerable. http://nakedsecurity.sophos.com/2014/04/10/sscc-142-heartbleed-explained-patches-evaluated-apple-chastised-podcast/ If you think you may be affected and don't knowfalse

Towerwall Information Security/Malware Alert Vol 13.67 - Notorious "Gameover" malware gets itself a kernel-mode rootkit...

Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security. We've covered it as plain old Zbot. We've covered the Citadel variant, which appeared when the original Zbot code was leaked online. We've even written about the time it pretended to be a Microsoft fix for CryptoLocker, a completely different strain of malware. Currently, the most widespread Zbot derivative is the Gameover bot, also known as Zeus P2P because of its use of peer-to-peer networkfalse

Internet Explorer, .NET, IPv6 and Shockwave top the February 2014 Patch Tuesday list

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security , Cloud Security , Shockwave. Internet Explorer , security policy , cybercriminals , Security Alert , cloud services , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

For today's Patch Tuesday, Microsoft released seven bulletins (a surprise after only announcing five last week) and Adobe released one. There are four critical advisories, to me the most important of which is MS14-010 affecting Internet Explorer versions 6 through 10. This patch fixes 24 vulnerabilities, one of which has been publicly disclosed. Considering that 22 of these vulnerabilities can lead to remote code execution, this fix is priority one. MS14-007 is a flaw in the Direct2D graphicsfalse

Why wasn't healthcare.gov security properly tested?

security software , Security Regulations , credit card security , Security Threat , Security Program , Information Security , web server , Application Security , Security , software updates , Hackers , Web Application Firewall , HIPAA , security policy , cybercriminals , penetration testing , information security tips , web users , cybersecurity

Michelle Drolet

When the healthcare.gov website was launched on Oct. 1 it didn't take long for technical issues to hit the headlines. Americans trying to register for health care found the website unusable. There were glitches, extremely long loading times, and serious errors, but most worrying of all for anyone entrusting sensitive data to the system was the lack of security testing. Three white hat hackers, charged with exposing flaws in the security of online systems told a Congress hearing that thefalse

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Towerwall Security Patch Alert Vol 13.63

security software , Data Security , Security Threat , Information Security , Security , cybercriminals , Security Alert , information security tips , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Patch Tuesday January 2014 - Microsoft, Adobe and Oracle by Chester Wisniewski As expected Microsoft delivered four patches on patch Tuesday covering Windows XP, 2003, 7, 2008 R2, Word and Dynamics. All four patches are rated important, the first time in memory that none of the fixes were critical. The Word fix applies to all Windows versions and could result in remote code execution. (What does this mean?) The operating system fixes will require a reboot. Adobe also released fixes today forfalse