Towerwall's InfoSec Blog

Content Type

See all

Save the Date: Information Security Summit - December 2020

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , ransomware , Information Security Summit , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please join us for our 8th Annual Information Security Summit! “The Evolving Threat Landscape 2020” This regional event provides participants with an update on the latest developments, trends, and status in information security. With the growing popularity of disruptive technologies, including mobility and cloud computing, social networking, and big data analytics, the accompanying data security and privacy issues become fundamental concerns.

Save the Date: Information Security Summit 2017

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , Information Security Summit , Compliance & Privacy , penetration testing , Events , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Save the Date: Information Security Summit 2016

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Phishing , GDPR , Information Security , Application Security , Security , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Full rules for protecting net neutrality released by FCC

network security , FCC , Information Security , Cloud Security , Title II of the Communications Act , Compliance , Enterprise

Michelle Drolet

The US Federal Communications Commission (FCC) on Thursday lay down 400 pages worth of details on how it plans to regulate broadband providers as a public utility. These are the rules - and their legal justifications - meant to protect net neutrality. They were passed last month, and details have been eagerly anticipated. The main gist of the lengthy document released on Thursday are these three new rules:

Michelle Drolet quoted in TechTarget

network security , Information Security , Cloud Security , security policy , Mobile Security , cybersecurity

Michelle Drolet

Our Michelle Drolet is quoted in TechTarget's article "Four ways DevOps can boost AWS security". Read more below:

Introducing Towerwall's vCISO Services

network security , Security Services , Budget , Virtual CISO , Fractional Chief Information Security Officer (CIS , Information Security , Compliance , cybersecurity , vCISO

Michelle Drolet

Towerwall is proud to offer our new vCISO Program.

Data Privacy Alert Vol 13.82 – The GHOST vulnerability - what you need to know

network security , Linux , Security Program , Information Security , Hackers , GHOST , Security Alert , cannabis , Enterprise , Data Breach

Michelle Drolet

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it's a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as decimal digits, you will never get anything longer than 255. 255. 255. 255. That takes up 15 characters, so you may decide that you'll never need more thanfalse

Save the Date: Please join us at the Information Security Summit 2015

Security Partners , network security , Information Security , Application Security , Security , Information Security Summit , Events , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Michelle Drolet published in NetworkWorld - Throw your vendor under the bus after a breach? Not quite so fast

Security Partners , network security , Security Regulations , Information Security , Application Security , Cloud Security , security policy , Compliance , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Our Michelle Drolet is quoted in NetworkWorld's article "Throw your vendor under the bus after a breach? Not quite so fast". Read more below:

The 4 Es of Enterprise Security

Security Partners , network security , Security Services , IT Infrastructure , Assessment , Security Regulations , Enforce , Establish , Security Program , Information Security , Evaluate , Application Security , Security , Cloud Security , security policy , 4E Methodology , Educate , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in place, vigilance is an ongoing requirement because new threats are emerging all the time. In the face of ourfalse