Towerwall's InfoSec Blog

Content Type

See all

Views from the Inside: Is your data safe with free cloud services? (guest post)

Security Partners , network security , Security Services , security software , Data Security , threat landscape , Security Threat , Security Program , Security , Hackers , Cloud Security , cyber-attack , HIPAA , security policy , cybercriminals , Security Alert , cloud services , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from the headache of backup management, disaster recovery, and bandwidth for instant anytime access. Convenient? Yes, most definitely. Safe and suitable for the enterprise? Well ...false

Facebook leaks are a lot leakier than Facebook is letting on

Security Partners , network security , Security Services , Web Storage , threat landscape , credit card security , Security Threat , Security Program , Information Security , Security , Facebook , Cloud Security , Web Application Firewall , cyber-attack , cybercriminals , information security tips , Web Browser , security research , web users , cybersecurity , Enterprise

Michelle Drolet

Remember last week, Facebook leaked email addresses and phone numbers for 6 million users, but that it was really kind of a modest leak, given that it's a billion-user service? OK, scratch the "modest" part. The researchers who originally found out that Facebook is actually creating secret dossiers for users are now saying the numbers don't quite match up. The number of affected users Facebook noted in a posting on its security blog is far less than what they themselves found, and Facebook isfalse

Introducing Towewall's Alternative Cloud-based File Sharing Solutions

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , information security tips , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Tips for testing your mobile app security

Security Partners , Security Services , Data Security , Towerwall , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , cloud services , Mobile Protection , vulnerability management , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Wherever an app originates from, it is vital that you can vouch for its security before it is circulated The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is " bring your own application" (BYOA), because many public app stores have serious malware problems. Enterprise app stores could be the answer. false

Towerwall Security / Vulnerability Alert: Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

Security Services , Data Security , Office , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Security , Mac , security policy , Microsoft , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of what's coming. These early notifications generally don't give any details, summarizing only the basics, such as:

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Mobile Devices , Security Threat , Information Security , Application Security , Security , Mobile Apps , Information Security Summit , endpoint security system , Cloud Security , HIPAA , penetration testing , financial security , information security tips , Compliance , Mobile Protection , vulnerability management , Mobile Security

Michelle Drolet

Check out Search Security's article - "HIPAA Omnibus Rule, PPACA challenge enterprise compliance management", where our own Natalie Kmit and the Information Security Summit 2013 are highlighted:

Are mobile apps truly enterprise-secure?

network security , Security Services , security software , Data Security , threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Web Application Firewall , security policy , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergone security penetration testing? Could the mobile apps your business uses be jeopardising your data security or even regulatory compliance?

A case for the Growing Need for Application Security.

Security Partners , Security Services , security software , Data Security , threat landscape , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , information security tips , security research , cybersecurity

Michelle Drolet

Islamist Element in Attacks. A pro-Islamic, anti-American hacking campaign appears to have jumped the gun and started early with hundreds of sites being compromised today. Set to take place on May 7 this month - thought to be US time - and targeting government sites in the US, Israel and India, the campaign is called #OpUSA. It is coordinated mainly through Twitter and postings on sites like Pastebin, with an unknown amount of participants. However, lists of compromised sites are alreadyfalse

Verify the Security of your Mobile Apps

Security Partners , network security , Security Services , security software , Data Security , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , iPhone , Mobile Apps , T-Mobile , security policy , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Network World - The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage tofalse

How to ensure mobile apps are secure for the enterprise

Android , Security Services , security software , Data Security , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Application Security , Security , malware , iPhone , Mobile Apps , T-Mobile , security policy , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , Enterprise , Data Breach

Michelle Drolet

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergonefalse