Towerwall's InfoSec Blog

Content Type

See all

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

10 Things I Know About... Mobile Security

Security Services , passwords , Web Storage , Data Security , Security Regulations , Mobile Devices , Security Threat , Information Security , web server , Application Security , Security , iPhone , Mobile Apps , Cloud Security , T-Mobile , Web Application Firewall , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , Data Privacy , Web Browser , security research , Mobile Security , web users , cybersecurity , Data Breach

Michelle Drolet

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways.

Verify the Security of your Mobile Apps

Security Partners , network security , Security Services , security software , Data Security , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , iPhone , Mobile Apps , T-Mobile , security policy , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Network World - The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage tofalse

How to ensure mobile apps are secure for the enterprise

Android , Security Services , security software , Data Security , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Application Security , Security , malware , iPhone , Mobile Apps , T-Mobile , security policy , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , Enterprise , Data Breach

Michelle Drolet

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergonefalse

Mobile Devices Get Means For Tamper-Evident Forensic Auditing

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Security , iPhone , AT&T , Mobile Apps , T-Mobile , cyber-attack , security policy , cybercriminals , information security tips , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The convenience of mobile devices has led to their rapid proliferation in the work place. But along with that convenience come security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability tofalse

BYOD Brings on a War of Worry

BYOD Brings on a War of Worry

network security , Security Services , security software , Data Security , BYOD , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , T-Mobile , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in costs for employee-issued hardware. Unfortunately that is not entirely the case.

Mobile Devices Get Means for Tamper-evident Forensic Auditing

Verizon , security software , Data Security , Security Regulations , Mobile Devices , Security Program , Information Security , Application Security , Security , iPhone , AT&T , Mobile Apps , Hackers , Cloud Security , T-Mobile , cyber-attack , security policy , cybercriminals , information security tips , Compliance , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security breaches and guarantee compliance,false