Towerwall's InfoSec Blog

Content Type

See all

Michelle Drolet

For all the infosec hurdles to overcome, we can build a bright future if the enterprise can pull together. We often talk about the enormous challenges facing IT departments around the world. The consumerization of IT, driven by the BYOD trend and coupled with mobility, has given birth to a wide range of serious security threats. As the enterprise increasingly relies on the cloud to provide software, infrastructure, and platforms as services, safeguarding valuable company data is an entirelyfalse

7 security threats that go ignored too often

Phishing , Application Security , malware , cannabis , Enterprise

Michelle Drolet

From unencrypted email to open Wi-Fi to faulty firewalls, some of the most common security threats could easily give away the entire farm. More threats emerge for IT departments every year. Cybersecurity is increasingly challenging as attacks get more sophisticated. But many core basics are still being ignored.

Secure Your Future with a Virtual CISO - Featured in Infosecurity Magazine

Budget , Virtual CISO , Fractional Chief Information Security Officer (CIS , CISO , Information Security , Application Security , Security , Cloud Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below: The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety and a widening gap in the skills required to identify and combat them. Knowing how to lead the charge in identifying and analyzing threats, creating strategic security plans, and ensuring compliance, requires the right level offalse

Towerwall's Latest Article "Secure Your Future with a Virtual CISO" Featured in Infosecurity Magazine

Virtual CISO , Fractional Chief Information Security Officer (CIS , Information Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below:

Known vulnerabilities pose biggest IT security threats

Misconfigurations , Internet of Things , Enterprise

Michelle Drolet

Cyber risk report cites server misconfigurations as the No. 1 vulnerability. It's often said, "There's nothing new under the sun." And that appears to be the case in the world of cybersecurity where hackers most often exploit known vulnerabilities to gain access to private computer files, according to HP's 2015 Cyber Risk Report. Maintaining strong computer security, the report says, is largely a process of plugging up known holes.

Michelle Drolet published in Web Security Journal - Know When to Onboard a Virtual CISO

Government Compliance Regulations , Virtual CISO , Fractional Chief Information Security Officer (CIS , CISO , Information Security , Compliance , vCISO , Enterprise

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Know When to Onboard a Virtual CISO" is featured in the Web Security Journal. Read more below:

Throw your vendor under the bus? Not quite so fast

Security Partners , Risk Management , Assessment , Information Security , cybercriminals , Third-party Vendor , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Full rules for protecting net neutrality released by FCC

network security , FCC , Information Security , Cloud Security , Title II of the Communications Act , Compliance , Enterprise

Michelle Drolet

The US Federal Communications Commission (FCC) on Thursday lay down 400 pages worth of details on how it plans to regulate broadband providers as a public utility. These are the rules - and their legal justifications - meant to protect net neutrality. They were passed last month, and details have been eagerly anticipated. The main gist of the lengthy document released on Thursday are these three new rules:

Data Privacy Alert Vol 13.82 – The GHOST vulnerability - what you need to know

network security , Linux , Security Program , Information Security , Hackers , GHOST , Security Alert , cannabis , Enterprise , Data Breach

Michelle Drolet

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it's a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as decimal digits, you will never get anything longer than 255. 255. 255. 255. That takes up 15 characters, so you may decide that you'll never need more thanfalse

Save the Date: Please join us at the Information Security Summit 2015

Security Partners , network security , Information Security , Application Security , Security , Information Security Summit , Events , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!