Towerwall's InfoSec Blog

Content Type

See all

Mobile Devices Get Means For Tamper-Evident Forensic Auditing

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Security , iPhone , AT&T , Mobile Apps , T-Mobile , cyber-attack , security policy , cybercriminals , information security tips , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The convenience of mobile devices has led to their rapid proliferation in the work place. But along with that convenience come security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability tofalse

Warning: Java vulnerable to hackers, U.S. government says

Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , Big Data , Data Privacy , security research , cybersecurity , Enterprise , Data Breach , Java

Michelle Drolet

Jan 11 (Reuters) - The U.S. Department of Homeland Security urged computer users to disable Oracle Corp's (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts' prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web.

Towerwall Security Alert 2013

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Security , cyber-attack , security policy , cybercriminals , Security Alert , Data Privacy , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As the year draws to a close, it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. We know this time of year is incredibly busy and as a trusted advisor, you expect Towerwall to stay on the cutting edge of security information and share our findings. To help you understand the impacts of threats to your business, we would like to share Trend Micro's 2013 forecast report, "Securityfalse

Mobile Devices Get Means for Tamper-evident Forensic Auditing

Verizon , security software , Data Security , Security Regulations , Mobile Devices , Security Program , Information Security , Application Security , Security , iPhone , AT&T , Mobile Apps , Hackers , Cloud Security , T-Mobile , cyber-attack , security policy , cybercriminals , information security tips , Compliance , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security breaches and guarantee compliance,false