Towerwall's InfoSec Blog

Content Type

See all

Data Security Review Issue 2: Know the Threats

Data Security , Security Threat , Information Security , Security , Hackers , cybercriminals , Security Alert , Data Privacy , Data Breach

Michelle Drolet

Welcome to Issue 2 of the Data Security Review

The Benefits of Cloud-Based Endpoint Security

The Benefits of Cloud-Based Endpoint Security

security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , endpoint security system , security policy , Big Data , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cloud-based IT security systems can be an ideal fit for smaller businesses, freeing them from internal IT overhead, cutting complexity, and providing scalability. Here are five reasons that switching to afalse

Why security professionals need to get more creative with penetration testing (and how to do it)

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Cloud Security , penetration testing , Big Data , Data Privacy , vulnerability management , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Criminals are evolving with their techniques for hacking and breaching corporate assets, so security managers need to as well. Here are some ways companies are going beyond standard pen testing in order to increase awareness By Maria Korolov Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common Vulnerability Scoring System is an industry standard, but has been around for afalse

Is Blind Trust Making You Unsafe?

network security , security software , Data Security , Security Regulations , credit card security , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , endpoint security system , Compliance , Big Data , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Personal and business relationships rely on trust to function, but blind trust in the digital world is downright dangerous. We’re asked to trust companies all the time. We trust them with personal details and they promise to keep them safe. It’s the same story in the enterprise. One company will entrust another to backup and store data, keeping it accessible for employees, but shutting out criminals and spies. Sometimes that trust proves to be misplaced, with disastrous results. On a personalfalse

Towerwall Heartbleed Vulnerability Alert

network security , Data Security , Security Regulations , Heartbleed , credit card security , Security Threat , Information Security , Security , security policy , cybercriminals , penetration testing , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Good Afternoon: The IT infrastructure your organization may use for day-to-day business may be vulnerable because of the Heartbleed vulnerability. Sophos a Towerwall partner has prepared a podcast of the Heartbleed vulnerability, which addresses who is likely affected, workarounds and an offer to help determine if you are vulnerable. http://nakedsecurity.sophos.com/2014/04/10/sscc-142-heartbleed-explained-patches-evaluated-apple-chastised-podcast/ If you think you may be affected and don't knowfalse

Patch Tuesday wrap-up, March 2014 - critical fixes from Microsoft and Adobe

network security , security software , Data Security , Security Threat , Information Security , Security , Microsoft , Security Alert , Big Data , Data Privacy , Enterprise , Data Breach

Michelle Drolet

by Paul Ducklin on March 12, 2014 We already wrote about Microsoft's March 2014 patches, noting that, as usually happens, there was an All-Points Bulletin for Internet Explorer coming up. Microsoft doesn't call them APBs, of course - they are Cumulative Security Updates, with one bulletin covering all the numerous versions, bitnesses and CPU flavors of Redmond's IE browser. What we weren't able to tell you in advance was whether the widely-publicized (but fortunately not widely-exploited) false

Towerwall Information Security/Malware Alert Vol 13.67 - Notorious "Gameover" malware gets itself a kernel-mode rootkit...

Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security. We've covered it as plain old Zbot. We've covered the Citadel variant, which appeared when the original Zbot code was leaked online. We've even written about the time it pretended to be a Microsoft fix for CryptoLocker, a completely different strain of malware. Currently, the most widespread Zbot derivative is the Gameover bot, also known as Zeus P2P because of its use of peer-to-peer networkfalse

Stay Secure in the Cloud with Sophos Cloud Endpoint

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Cloud Security , security policy , information security tips , Compliance , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Towerwall and Sophos, partnering to protect data integrity in the cloud.

Internet Explorer, .NET, IPv6 and Shockwave top the February 2014 Patch Tuesday list

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security , Cloud Security , Shockwave. Internet Explorer , security policy , cybercriminals , Security Alert , cloud services , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

For today's Patch Tuesday, Microsoft released seven bulletins (a surprise after only announcing five last week) and Adobe released one. There are four critical advisories, to me the most important of which is MS14-010 affecting Internet Explorer versions 6 through 10. This patch fixes 24 vulnerabilities, one of which has been publicly disclosed. Considering that 22 of these vulnerabilities can lead to remote code execution, this fix is priority one. MS14-007 is a flaw in the Direct2D graphicsfalse

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise