Ransomware Featured on the Today Show

By Michelle Drolet . 4 Jan 2016

A “ransomware” segment was recently on NBC’s  Today featuring our security partner Sophos. To learn more about ransomware. click the thumbnail below:    

Corporate    Cyberattack   

Building malware defenses: Control email, web browsers, and ports

By Michelle Drolet . 4 Jan 2016

Another staple in a series examining the Center for Internet Security’s best practices.   Our last article looked at applying Critical Security Controls 4, 5, and 6 to your organization, covering vulnerability assessment, administrative privileges, and audit logs. Now it’s time to move on to CSCs 7, 8, and 9. Email programs and web browsers … Continue reading Building malware defenses: Control email, web browsers, and ports

Applying more Critical Security Controls to your organization

By Michelle Drolet . 4 Dec 2015

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we’re going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. … Continue reading Applying more Critical Security Controls to your organization

Towerwall Donates $7K to MassBay Foundation

By Michelle Drolet . 2 Dec 2015

Originally posted on MetroWest Daily News. Towerwall, a Framingham-based network security and policy management company, donated $7,000 to the MassBay Foundation to sponsor student scholarships. Towerwall CEO Michelle Drolet, who is also a board member of the MassBay Foundation, presented MassBay interim president Yves Salomon-Fernandez, MassBay chief information officer Michael Lyons and MassBay vice president … Continue reading Towerwall Donates $7K to MassBay Foundation

Four Signs your mobile app may be at risk

By Michelle Drolet . 23 Nov 2015

How can you make sure the mobile apps you access are secure? A security profile should be at the top of the developer’s list when compiling a mobile app but that’s hardly the case. That’s a pity, because building a profile is easier to do during the dev phase. Are most mobile apps putting your … Continue reading Four Signs your mobile app may be at risk

The challenges of third-party risk management

By Michelle Drolet . 17 Nov 2015

Vendors and other third parties should be treated with the same level of intense scrutiny as your own in-house risk compliance mandates.   How seriously is your company treating the risk of a data breach? Have you done due diligence on all of your vendors and third-party partners? Cyberattacks can have a devastating impact in … Continue reading The challenges of third-party risk management

Sophos Launches Security Heartbeat To Bring Together Network, Endpoint Capabilities

By Security Partner . 9 Nov 2015

by Sarah Kuranda Sophos is launching a new technology Monday that synchronizes threat intelligence and automation across endpoint and network levels. Sophos Security Heartbeat, part of the Oxford, England-based company’s new XG firewall series, links together the company’s next-generation firewall and UTM solutions with its next-generation endpoint technologies. In doing that, the company said, it is … Continue reading Sophos Launches Security Heartbeat To Bring Together Network, Endpoint Capabilities

Cover your top 7 basic security threats first

By Michelle Drolet . 2 Nov 2015

When it comes to infosec, many of the most core basics are being overlooked. Many of the most obvious areas where security can be tightened up with little effort are being blatantly ignored. Are you doing your level best by covering the basics? Below are seven potential vulnerabilities. Most of these can be tackled without … Continue reading Cover your top 7 basic security threats first

How CSC can help build your InfoSec framework

By Michelle Drolet . 28 Oct 2015

Critical Security Controls is a set of best practices devised by the Center for Internet Security, a nonprofit dedicated to improving cybersecurity in the public and private sectors.   Cyberattacks are costing businesses between $400 billion and $500 billion per year, depending on which analysts you listen to. Cybersecurity has never been a hotter topic. … Continue reading How CSC can help build your InfoSec framework

The evil that lurks inside mobile apps

By Michelle Drolet . 16 Oct 2015

The Enterprise is at risk from malware and vulnerabilities hiding within mobile apps. You have to test your mobile apps to preserve your security.   Mobile apps are ubiquitous now, and they offer a range of business benefits, but they also represent one of the most serious security risks ever to face the enterprise. The … Continue reading The evil that lurks inside mobile apps

Page 9 of 25« First...567891011121314...20...Last »

Tags