Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

By Michelle Drolet . 10 May 2017

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer’s specific needs.   “Security is not one-size-fits-all, so it depends on the type of organization and what their risk tolerance level is,” said Michelle Drolet, CEO at Towerwall Inc., a data … Continue reading Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

10 things I know about… Public Wi-Fi

By Michelle Drolet . 2 May 2017

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers. 9. Sign me up By default, most mobile phones/devices are set to ask your permission to join a network. Once you obtain credentials, the known network will join your phone automatically. 8. Sniffing … Continue reading 10 things I know about… Public Wi-Fi

Join Towerwall at the New England Bank Technology & Retail Banking Conference

By Michelle Drolet . 18 Apr 2017

Michelle Drolet and the Towerwall team will be attending the 36th Annual New England Bank Technology + Retail Banking Conference and Exhibit, on Friday, May 19th at the DoubleTree in Danvers, MA. Stop by Booth 27 where we will be discussing: FinTech Security Challenges Topics include: Today’s top security threats and how to stay safe Identifying … Continue reading Join Towerwall at the New England Bank Technology & Retail Banking Conference

Protect your unstructured data with user behavior analytics

By Michelle Drolet . 4 Apr 2017

User behavior analytics sniffs out anomalies in users’ actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its … Continue reading Protect your unstructured data with user behavior analytics

AlienVault announces new training: Incident Response for USM Appliance Analysts

By Michelle Drolet . 31 Mar 2017

AlienVault recently announced a new addition to the AlienVault training portfolio: Incident Response for USM Appliance Analysts, a two-day course that we will start delivering Live and Online in May. AlienVault has had *many* requests from customers and MSSPs for training focused on the analysis of threats identified by the USM Appliance. This course provides … Continue reading AlienVault announces new training: Incident Response for USM Appliance Analysts

Botnets: Is your network really protected?

By Michelle Drolet . 27 Mar 2017

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote … Continue reading Botnets: Is your network really protected?

Great article: Fraud Speak — Learn the Lingo to Beat Scammers

By Michelle Drolet . 24 Mar 2017

In order to stay ahead of threats, you need to know what to watch out for. This great article: Fraud Speak — Learn the Lingo to Beat Scammers >   breaks down and defines hacker lingo. Stay informed, stay ahead, stay safe.  

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security – Thursday, April 6, 2017

By Michelle Drolet . 17 Mar 2017

Join us for our next InfoSec at Your Services Meetup: “7 Secrets of Offensive Security” by Gary Miliefsky   When: Thursday, April 6, 2017 6:30 PM to 8:00 PM Where: Skyboxx, 319 Speen Street, Natick Host: Gary Miliefsky Meet Gary > We will discuss: The 7 Secrets of Offensive Security. With all the breaches happening in … Continue reading InfoSec at Your Services Meetup: 7 Secrets of Offensive Security – Thursday, April 6, 2017

Hackers show no mercy—even for pot dispensaries. Anatomy of a national point-of-sale breach and takedown of 1,000-plus marijuana dispensaries

By Michelle Drolet . 1 Mar 2017

Back when Apple was the plucky young upstart that dared to be different, the Mac was the machine for creative types and there was a perception that it wasn’t a target for hackers because of its cultural cool factor. You would expect the same rules to apply to the legalized marijuana market, but a major … Continue reading Hackers show no mercy—even for pot dispensaries. Anatomy of a national point-of-sale breach and takedown of 1,000-plus marijuana dispensaries

Hackers show no mercy—even for pot dispensaries

By Michelle Drolet . 27 Feb 2017

Anatomy of a national point-of-sale breach and takedown of 1,000-plus marijuana dispensaries   Back when Apple was the plucky young upstart that dared to be different, the Mac was the machine for creative types and there was a perception that it wasn’t a target for hackers because of its cultural cool factor. You would expect … Continue reading Hackers show no mercy—even for pot dispensaries

Page 4 of 2712345678910...20...Last »

Tags