Towerwall's InfoSec Blog

Content Type

See all

Application security is maturing, but independent testing is crucial

Open Web Application Security Project (OWASP) , appsec , Application Security , independent testing , OWASP , cannabis , vCISO , Enterprise

Michelle Drolet

Skills shortage is making shift to continuous appsec testing challenging. While application security (appsec) is firmly on the radar, most organizations still have a way to go before they can be confident about how secure their apps are. Devops is accelerating the speed of development and, coupled with the shift to the cloud, it’s creating many challenges for appsec. Breaking down walls between security, development and business units is easier said than done and the security skills shortagefalse

Always be Prepared: Monitor, Analyze and Test your Security

Center for Internet Security (CIS) , Incident Response and Management , 20 Critical Security Controls , web application security , Penetration Tests , Application Software Security , open-source software , Red Team Exercises , CIS Controls , Compliance & Privacy , penetration testing , OWASP , cannabis , Enterprise

Michelle Drolet

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20 This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussedfalse

Bugs for cash: Bounty hunters in the new wild west of security

Open Web Application Security Project (OWASP) , software bugs , Pwn2Own , Bugcrowd , DROWN , OWASP , white market , cannabis , Enterprise

Michelle Drolet

How security researchers and programmers hunt software bugs for cash rewards The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly that unscrupulous bounty hunters can take advantage of if they successfully identify a vulnerability. The average cost of a data breach is $3.8false

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later