Towerwall's InfoSec Blog

Content Type

See all

Protect your unstructured data with user behavior analytics

Yahoo , Varonis , NetworkWorld , CIA , behavior analytics , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

User behavior analytics sniffs out anomalies in users' actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its hacking tools via WikiLeaks. It’s ironic that the CIA’s hacking guides have been hacked, but it just goes to show how difficult it can be to prevent. Carelessly handledfalse

Botnets: Is your network really protected?

ito , Michelle Drolet , Smart Home , NetworkWorld , Internet of Things , botnets , cannabis , Enterprise

Michelle Drolet

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote access and facilitates the collection of data, which is ostensibly used to make our systems “smarter.” However, it also opens new doors into our offices and homesfalse

How Much Does a Data Breach Actually Cost?

Yahoo , Sony , NetworkWorld , Phishing , malware , ransomware , Target , Compliance & Privacy , penetration testing , cannabis , Enterprise , Data Breach

Michelle Drolet

The average cost of a data breach involving fewer than 10,000 records was $5 million The American public has become so inured to data breaches that it’s difficult to remember them all. Infamous breaches like the ones at Target and Sony become almost forgettable when confronted with the recently disclosed half-billion accounts compromised at Yahoo in 2014.

DROWN attack sinks security for millions of websites

SSLv2 server , NetworkWorld , DROWN , TLS

Michelle Drolet

Security researchers reveal new technique to break TLS using SSLv2 server. The war to close down security vulnerabilities is never-ending, but the new “DROWN” vulnerability is one of the biggest to rear its ugly head in recent months. A group of security researchers from a number of different universities and research institutes just unveiled this vulnerability, which they say could affect 33% of all HTTPS servers. That potentially exposes around 11.5 million HTTPS servers worldwide plusfalse