Towerwall's InfoSec Blog

Content Type

See all

When It Comes to Cyber Security, The Weakest Link is Still Employees

Training , employee , cannabis , Enterprise , Gap Assessment

Michelle Drolet

We need to make sure the highly regulated world of cannabis business knows how to protect its data, customer and otherwise, yet also control access to it without too much hassle. As an insurgent breed, hackers are savvy and will seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, says the ACC Foundation: State of Cybersecurity Report. Of course you want tofalse

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

Secure Your Future with a Virtual CISO - Featured in Infosecurity Magazine

Budget , Virtual CISO , Fractional Chief Information Security Officer (CIS , CISO , Information Security , Application Security , Security , Cloud Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below: The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety and a widening gap in the skills required to identify and combat them. Knowing how to lead the charge in identifying and analyzing threats, creating strategic security plans, and ensuring compliance, requires the right level offalse

Towerwall's Latest Article "Secure Your Future with a Virtual CISO" Featured in Infosecurity Magazine

Virtual CISO , Fractional Chief Information Security Officer (CIS , Information Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below:

Michelle Drolet published in NetworkWorld - Are mobile apps putting your data at risk?

Android , Information Security , Application Security , Mobile Apps , Cloud Security , Mobile Security , Data Breach , Gap Assessment

Michelle Drolet

Our Michelle Drolet is quoted in NetworkWorld's article "Are mobile apps putting your data at risk?". Read more below:

The 4 Es of Enterprise Security

Security Partners , network security , Security Services , IT Infrastructure , Assessment , Security Regulations , Enforce , Establish , Security Program , Information Security , Evaluate , Application Security , Security , Cloud Security , security policy , 4E Methodology , Educate , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in place, vigilance is an ongoing requirement because new threats are emerging all the time. In the face of ourfalse

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later

Firefox 32.0 fixes holes, shakes out some old SSL certs, introduces certificate pinning

security software , Data Security , Twitter , certificates , Information Security , Application Security , Security , cybercriminals , Data Privacy , cannabis , cybersecurity , Firefox , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

by Paul Ducklin on September 3, 2014

Cork That App or Face Attack

Cork That App or Face Attack

passwords , Data Security , Government Compliance Regulations , Assessment , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Hackers , endpoint security system , security policy , cybercriminals , penetration testing , information security tips , Compliance , Mobile Security , cybersecurity , Enterprise , Gap Assessment

Michelle Drolet

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing, there is still a long way to go. After all, you are only asfalse

Deciding Between Vulnerability Scanning And Penetration Testing

Security Services , security software , Data Security , Assessment , Security Regulations , Security Threat , Information Security , Application Security , Security , Hackers , security policy , cybercriminals , penetration testing , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test at least once a year. These are the minimum requirements to remain compliant; it is prudent to scan and test more often.false