Towerwall's InfoSec Blog

Content Type

See all

How to Build a Robust Incident Response Capability for Financial Institutions - 8/16/18

Webinar , Business Continuity , Michelle Drolet , GDPR , BrightTalk , malware , ransomware , Compliance & Privacy , Compliance , Regulated Industries , cannabis , cybersecurity , Enterprise

Michelle Drolet

How to Build a Robust Incident Response Capability for Financial Institutions Our own Michelle Drolet will be discussing the need for developing a solid Incident Response Program and doing Tabletop exercise throughout the year. An Incident Response Plan (IRP) will ensure information security incidents, once identified, will be handled and communicated appropriately. Consistency of how incidents are handled and communicated is paramount to a successful incident response.

10 Things I Know About… Cybersecurity trends

Virtual CISO , Worcester Business Journal , Phishing , Data breaches , PCI , malware , ransomware , cybersecurity trends , 10 Things I Know , IoT , cannabis , cybersecurity , vCISO , Enterprise

Michelle Drolet

10) Data breaches. Nearly 5 million data records are lost or stolen worldwide every single day, or 58 records every second. According to an IBM report, the average cost of a data breach is $7.3 million.

Can machine learning be used to shore up cyber defenses?

Sophos , machine learning , artificial intelligence , malware , Internet of Things , cybercriminals , cyber defense , cannabis , cybersecurity , Enterprise

Michelle Drolet

Deep learning can be a vital supplementary tool for cybersecurity. The meteoric rise of malware has put us all at risk. We are engaged in a never-ending race with cybercriminals to protect systems, plug gaps, and eradicate vulnerabilities before they can gain access. The front line grows by the day as we share more data and employ new network-connected devices via the rise of the Internet of Things. Keeping up with the fast pace of new malicious threats is a real challenge. If it takesfalse

Protect your unstructured data with user behavior analytics

Yahoo , Varonis , NetworkWorld , CIA , behavior analytics , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

User behavior analytics sniffs out anomalies in users' actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its hacking tools via WikiLeaks. It’s ironic that the CIA’s hacking guides have been hacked, but it just goes to show how difficult it can be to prevent. Carelessly handledfalse

Save the Date: Information Security Summit 2017

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , Information Security Summit , Compliance & Privacy , penetration testing , Events , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

5 Cybersecurity Trends to Watch for 2017

5 Cybersecurity Trends to Watch for 2017

Fractional Chief Information Security Officer (CIS , CISO , Phishing , Application Security , ransomware , Internet of Things , IT departments , third-party partners , DDoS attacks , cannabis , cybersecurity , trends , vCISO , Enterprise

Michelle Drolet

Fresh and familiar threats to concern IT departments. As we embark on 2017, it's time to reflect on a year where cybersecurity has played a major role. Even presidential campaigns haven’t been free from hacking scandals and data leaks. The average cost of a data breach for companies grew from $3.8 million last year to $4 million in 2016, according to the Ponemon Institute. Companies of all sizes have embraced the cloud and open source has become the standard for infrastructure software. Bothfalse

Does the NSA have a duty to disclose zero-day exploits?

zero-day , cisco , Compliance & Privacy , National Security Agency (NSA) , penetration testing , Juniper , cannabis , cybersecurity , Fortinet , Enterprise

Michelle Drolet

The NSA should disclose all zero-day exploits. But it doesn't. To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.”

3 Ways to Protect Data and Control Access to It

Center for Internet Security (CIS) , private sector , Wireless Access Control , human error encryption , public sector , authentication , cannabis , cybersecurity , Enterprise

Michelle Drolet

Your company's data is its crown jewels, and you must protect it all times. CIS Controls 13, 14 and 15 will help you. Earlier we delved into disaster recovery and network security. Now it’s time to take a look at Critical Security Controls 13, 14 and 15, which cover data protection and access control. The Critical Security Controls are best practices devised by the Center for Internet Security (CIS), a nonprofit dedicated to improving cybersecurity in the public and private sectors. A company’sfalse

Save the Date: Information Security Summit 2016

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Phishing , GDPR , Information Security , Application Security , Security , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,