Towerwall's InfoSec Blog

Content Type

See all

Operationalizing Cybersecurity: Evolution, Seamlessness And Holistic Thinking As Key Drivers

operationalizing cybersecurity , Phishing , PCI , vulnerability management , cannabis , Enterprise

Michelle Drolet

When we say "operationalizing cybersecurity," what we are essentially saying is the implementation of best practices that strengthen your cybersecurity infrastructure. This results in a strong security posture able to address advanced and continuously evolving cyberthreats leveled at any organization. A well-defined cybersecurity strategy lies at the very root of seamless operationalizing. Key stakeholders like the C-suite and board members must actively define this strategy and ensure that itfalse

Applying more Critical Security Controls to your organization

Fractional Chief Information Security Officer (CIS , Application Security , Compliance & Privacy , vulnerability management , cannabis , Enterprise , Data Breach , Critical Security Controls (CSC)

Michelle Drolet

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we're going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. These concepts are encapsulated in CSCs 4, 5, and 6. You should develop stringent policies, consider devoting resources tofalse

What can the military teach us about cybersecurity?

Assessment , software systems , vulnerability management , military , cybersecurity

Michelle Drolet

Teaching the workforce to create a heightened state of awareness. It's time for the business world to toughen up on security. The threat from cybercriminals is pervasive. Successful attacks on financial institutions, large retailers, and even government bodies, are all too common. There's a reason that the Worldwide Threat Assessment of the US Intelligence Community report, released in February this year, put Cyber at the head of the list of global threats. But the targets are not alwaysfalse

Deciding Between Vulnerability Scanning And Penetration Testing

Security Services , security software , Data Security , Assessment , Security Regulations , Security Threat , Information Security , Application Security , Security , Hackers , security policy , cybercriminals , penetration testing , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test at least once a year. These are the minimum requirements to remain compliant; it is prudent to scan and test more often.false

Why security professionals need to get more creative with penetration testing (and how to do it)

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Cloud Security , penetration testing , Big Data , Data Privacy , vulnerability management , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Criminals are evolving with their techniques for hacking and breaching corporate assets, so security managers need to as well. Here are some ways companies are going beyond standard pen testing in order to increase awareness By Maria Korolov Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common Vulnerability Scoring System is an industry standard, but has been around for afalse

Towerwall Heartbleed Vulnerability Alert

network security , Data Security , Security Regulations , Heartbleed , credit card security , Security Threat , Information Security , Security , security policy , cybercriminals , penetration testing , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Good Afternoon: The IT infrastructure your organization may use for day-to-day business may be vulnerable because of the Heartbleed vulnerability. Sophos a Towerwall partner has prepared a podcast of the Heartbleed vulnerability, which addresses who is likely affected, workarounds and an offer to help determine if you are vulnerable. http://nakedsecurity.sophos.com/2014/04/10/sscc-142-heartbleed-explained-patches-evaluated-apple-chastised-podcast/ If you think you may be affected and don't knowfalse

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

Establishing Security Goals

network security , Security Services , security software , Data Security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , endpoint security system , Cloud Security , security policy , cybercriminals , penetration testing , information security tips , Compliance , security research , vulnerability management , Mobile Security , cybersecurity

Michelle Drolet

Implementing security practices in your organization’s employees’ daily work habits, and ensuring the integrity and confidentiality of information security, the goals of the Security Awareness Program are:

How Can you Expose Targeted Attacks and Combat APTs?

network security , Security Services , security software , Data Security , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , cybercriminals , penetration testing , financial security , information security tips , Big Data , Data Privacy , APT , vulnerability management , cybersecurity , Data Breach

Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique such as spear phishing, and existing security systems are unable to detect the attack. Data can be harvested forfalse

Tips for testing your mobile app security

Security Partners , Security Services , Data Security , Towerwall , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , cloud services , Mobile Protection , vulnerability management , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Wherever an app originates from, it is vital that you can vouch for its security before it is circulated The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is " bring your own application" (BYOA), because many public app stores have serious malware problems. Enterprise app stores could be the answer. false