Towerwall's InfoSec Blog

Content Type

See all

How to Build a Robust Incident Response Capability for Financial Institutions - 8/16/18

Webinar , Business Continuity , Michelle Drolet , GDPR , BrightTalk , malware , ransomware , Compliance & Privacy , Compliance , Regulated Industries , cannabis , cybersecurity , Enterprise

Michelle Drolet

How to Build a Robust Incident Response Capability for Financial Institutions Our own Michelle Drolet will be discussing the need for developing a solid Incident Response Program and doing Tabletop exercise throughout the year. An Incident Response Plan (IRP) will ensure information security incidents, once identified, will be handled and communicated appropriately. Consistency of how incidents are handled and communicated is paramount to a successful incident response.

For true cybersecurity you must know what employees are doing

User behavior analytics (UBA) , Phishing , phishing attacks , malware , ransomware , employee , cannabis , Enterprise , Data Breach

Michelle Drolet

A look at some options for keeping tabs on your staff and the possible pros and cons. Securing your data in the digital age is very challenging, but it has never been more necessary. We just looked at the hair-raising cost of a data breach in 2018 and we know that employees are often the weakest link. In fact, over 90% of all cyber-attacks are successfully executed with information stolen from employees, according to the Identity Management Institute. The majority of these employees arefalse

10 Things I Know About… Cybersecurity trends

Virtual CISO , Worcester Business Journal , Phishing , Data breaches , PCI , malware , ransomware , cybersecurity trends , 10 Things I Know , IoT , cannabis , cybersecurity , vCISO , Enterprise

Michelle Drolet

10) Data breaches. Nearly 5 million data records are lost or stolen worldwide every single day, or 58 records every second. According to an IBM report, the average cost of a data breach is $7.3 million.

The Cost of a Data Breach in 2018

Business Continuity , CCPA , Phishing , GDPR , PCI , malware , ransomware , General Data Protection Regulation (GDPR) , HIPAA , Compliance & Privacy , penetration testing , Compliance , cannabis , 2018 , Enterprise , Data Breach , Equifax

Michelle Drolet

58 data records are stolen every second at an average cost of $141 each. Trading in intellectual property and personal data is so widespread that someone invented a calculator that can estimate the potential harm to your own business. Nearly 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 58 records every second. High profile data breaches hit the headlines with worrying frequency. Just last year there werefalse

Join us for a Dinner Seminar with Darktrace - Wednesday, January 17, 2018

Phishing , malware , ransomware , Darktrace Ltd , cannabis , Enterprise

Michelle Drolet

Towerwall & Darktrace Dinner Seminar Hosted by Towerwall

Can machine learning be used to shore up cyber defenses?

Sophos , machine learning , artificial intelligence , malware , Internet of Things , cybercriminals , cyber defense , cannabis , cybersecurity , Enterprise

Michelle Drolet

Deep learning can be a vital supplementary tool for cybersecurity. The meteoric rise of malware has put us all at risk. We are engaged in a never-ending race with cybercriminals to protect systems, plug gaps, and eradicate vulnerabilities before they can gain access. The front line grows by the day as we share more data and employ new network-connected devices via the rise of the Internet of Things. Keeping up with the fast pace of new malicious threats is a real challenge. If it takesfalse

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

darwin defense , darwin , GDPR , malware , Compliance & Privacy , Malicious software , cannabis , Enterprise

Michelle Drolet

Coming to a future near you: software code that mutates and evolves. We often talk about computer systems and information security in biological terms. Threats and defenses evolve, viruses run rampant, and machines learn by emulating the neural networks in our brains. Cybersecurity is an endless war between attackers and defenders, just as biology is a war between predators and prey. What if we could create an automated process of selection for computer programs, where the fittest wouldfalse

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

spear phishing , Information Security Summit 2017 , BYOD , Government Compliance Regulations , Third Party Outsourcing , Phishing , GDPR , PCI , malware , ransomware , Unstructured Data , HIPAA , Compliance & Privacy , GRC , penetration testing , Events , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security - Thursday, April 6, 2017

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security - Thursday, April 6, 2017

Offensive Security , InfoSec at Your Services Meetup , InfoSec at Your Services , malware , Events , SnoopWall , meetup , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Join us for our next InfoSec at Your Services Meetup: "7 Secrets of Offensive Security" by Gary Miliefsky

IoT Could Be Our Downfall

IoT security , Gartner , Department of Consumer Affairs , Phishing , malware , ransomware , Internet of Things , cybercriminals , cannabis , Enterprise , Data Breach

Michelle Drolet

We need to secure the internet of things. The internet of things (IoT) is all about connecting devices to the internet so that they can talk to each other and to us, to make life more convenient. That might mean turning on the lights when we get up, or allowing us to use our phones to see who’s at the front door, even when we're at the office. The potential applications are endless. There are already more than 6 billion connected "things," and that's set to rise to more than 20 billion byfalse