Towerwall's InfoSec Blog

Content Type

See all

Michelle Drolet interviewed on "Today's security challenges" in recent TechTarget E-Handbook

TechTarget , Data Security , Fractional Chief Information Security Officer (CIS , Channel Partners , cannabis , vCISO , Enterprise

Michelle Drolet

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer's specific needs.

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Bridging the Cybersecurity Skills Gap: 3 Big Steps" is featured in the InformationWeek Dark Reading. Read more below:

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

network security , Risk Management , Data Security , Security Regulations , Information Security , Application Security , Security , Mac , software systems , malware , iPhone , software updates , Hackers , Cloud Security , security policy , cybercriminals , cloud services , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won't happen to them. Here are five common excuses that explain why some people think they don't need computer security and the reasons why they do.

Towerwall Security Alert V13.79 - How to clear out cookies, Flash cookies and local storage

HTTP , Linkedin , Web Storage , Cache , KISSmetrics , Data Security , DOM , Security Regulations , Twitter , Add-ons , Chrome , Cookies , eBay , Fingerprinting , Security Program , Information Security , Settings , Application Security , Security , HTML , Internet Explorer , LSO , Facebook , Private Browsing , Flash Cookies , Amazon , security policy , Gmail , Windows , Safari , Wikipedia , Data Privacy , Web Browser , WordPress , Pinterest , ETag , cybersecurity , Firefox , Enterprise , Data Breach , PayPal

Michelle Drolet

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions.

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later

Towerwall Information Security Update Vol 13.78 - 3 ways to make your Outlook.com account safer

network security , Data Security , Security Regulations , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , security policy , cybercriminals , Security Alert , internal emails , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

3 ways to make your Outlook.com account safer by John Hawes

Towerwall's Candy Alexander Receives 2014 ISSA Award for "Hall of Fame"

Data Security , Towerwall , ISSA International Awards , CISO , Information Security , ISSA International Conference , Security , cybersecurity , ISSA , Enterprise

Michelle Drolet

We are proud to announce that our own Candy Alexander will receive the ISSA "Hall of Fame" Award. See below for more information: Honoree to be Recognized Among RSA Founders at ISSA International Conference on Oct. 22 in Orlando BOSTON, MA--(Marketwired - Oct 9, 2014) - Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced that Candy Alexander, CISSP CISM, GRC Consultant for Towerwall, been inducted into the Hall of Fame by thefalse

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse