Towerwall's InfoSec Blog

Content Type

See all

Ransomware Today

Sophos , Webinar , Sophos Intercept X , ransomware , cannabis , Enterprise

Michelle Drolet

Last week we hosted an informative webinar on today's ransomware threats with our security partner Sophos. Watch a recording of the webinar below. I am sure you are seeing the explosion of ransomware in the headlines. Businesses of every size are targets and analysts estimate ransomware is on pace to be a $1B/year crime in 2016. Sophos Intercept X is their newly released anti-exploit tool, which stops hackers at the door and prevents zero-day attacks and exploits before they hit your system.false

Join us for our inaugural InfoSec at Your Services Meetup - Wednesday, October 19, 2016

SPAM , InfoSec at Your Services Meetup , InfoSec at Your Services , Phishing , malware , Events , meetup , cannabis , Enterprise

Michelle Drolet

Join us for our inaugural InfoSec at Your Services Meetup!

Upcoming Complimentary Partner Webinars

Varonis , Sophos , Webinar , Phishing , ransomware , penetration testing , Compliance , SnoopWall , cannabis , Enterprise

Michelle Drolet

Check out one of the upcoming complimentary partner webinars:

Always be Prepared: Monitor, Analyze and Test your Security

Center for Internet Security (CIS) , Incident Response and Management , 20 Critical Security Controls , web application security , Penetration Tests , Application Software Security , open-source software , Red Team Exercises , CIS Controls , Compliance & Privacy , penetration testing , OWASP , cannabis , Enterprise

Michelle Drolet

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20 This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussedfalse

Join Towerwall & Sophos for a Ransomware Webinar

Sophos , Webinar , Intercept X , ransomware , Events , cannabis , Enterprise

Michelle Drolet

Wednesday, October 12, 2016 11:00 AM - 12:00 PM EDT Hosted by Towerwall and Sophos I am sure you are seeing the explosion of ransomware in the headlines. Businesses of every size are targets and analysts estimate ransomware is on pace to be a $1B/year crime in 2016. Sophos Intercept X is their newly released anti-exploit tool, which stops hackers at the door and prevents zero-day attacks and exploits before they hit your system. Intercept X is designed to run alongside your existing AV andfalse

Towerwall's Blog named to the Best Computer Security Blogs 2016 by CreditDonkey

TrendMicro , Vormetric , Phishing , Top Computer Security Blogs 2016 , GDPR , ransomware , Compliance & Privacy , penetration testing , Compliance , Imperva , Qualys , CreditDonkey , cannabis , Fortinet , Enterprise

Michelle Drolet

We are honored to share that our blog was named as a Top Computer Security Blogs 2016 by CreditDonkey. CreditDonkey sites:

Does the NSA have a duty to disclose zero-day exploits?

zero-day , cisco , Compliance & Privacy , National Security Agency (NSA) , penetration testing , Juniper , cannabis , cybersecurity , Fortinet , Enterprise

Michelle Drolet

The NSA should disclose all zero-day exploits. But it doesn't. To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.”

Hired guns: The rise of the virtual CISO

Virtual CISO , Information Systems Security Association , Fractional Chief Information Security Officer (CIS , CISO , PCI , HIPAA , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance requires the right level of expertise.

Michelle Drolet

7 Secrets of Offensive Security Please join us for a complimentary Lunch & Learn session. Tuesday, August 16 11:00 am – 1:00 pm EST Sheraton Framingham Hotel, Framingham, MA *EARN CPE CREDITS

Cybersecurity is only as strong as your weakest link—your employees

Assessment , CIS Controls 16 , CIS Controls 17 , cannabis , Enterprise

Michelle Drolet

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17 You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report. It’s good to focus on firewalls, malware defenses and data protection, butfalse