Why every business needs a WISP

By Michelle Drolet . 19 Aug 2015

Non-compliance is a risk, and the Attorney General’s office carries a big stick for those who don’t follow the rules.   If you don’t have a written information security program (WISP) in place for your business, then you could be risking data theft, legal action, and punitive fines. The law in many states now dictates … Continue reading Why every business needs a WISP

Towerwall Security/Vulnerability Alert Vol 13.96

4 Aug 2015

 The “Stagefright” hole in Android – what you need to know Provided by Paul Ducklin at Sophos, Inc. The conference circuit can be a competitive arena, especially when there are multiple parallel streams. For example, back in 2010, I was at Black Hat in Las Vegas, and I attended the talk next door to the late Barnaby Jack’s now legendary … Continue reading Towerwall Security/Vulnerability Alert Vol 13.96

Join Towerwall at the ISSA New England September Chapter Meeting

By Michelle Drolet . 29 Jul 2015

Join us at the the Fall meeting of the ISSA of New England on: Thursday, September 17, 2015 11:00 AM to 3:30 PM @Showcase Cinema de Lux at Patriot Place – Gillette Stadium, Route 1, Foxborough, MA Click here for more information on the ISSA, Speakers and Keynote topics Click here to Register   About ISSA … Continue reading Join Towerwall at the ISSA New England September Chapter Meeting

Software vulnerabilities hit a record high in 2014, report says

By Michelle Drolet . 28 Jul 2015

Are you patching quickly enough?   How safe is the software you use? Do you have a system in place to identify vulnerabilities and patch them when they are discovered? How quickly do you react to vulnerability reports? There’s evidence that software vulnerabilities are on the rise, and few companies are taking the necessary action … Continue reading Software vulnerabilities hit a record high in 2014, report says

Using third-party vendors? Keep a close eye on them

By Michelle Drolet . 10 Jul 2015

Cybersecurity is only as strong as the weakest link. If your organization is using third-party vendors, policing their activity is critical to cybersecurity. Few can forget the theft of 110 million customer credit cards from Target in December 2013. But not as many know how hackers gained access to such a vast amount of sensitive … Continue reading Using third-party vendors? Keep a close eye on them

Cyberattack   

Don’t be mad at ransomware attackers, be grateful

By Michelle Drolet . 7 Jul 2015

Falling victim to a ransomware attack is most definitely inconvenient, but it could also serve as a wake-up call to the importance of backing up important data.   You’re minding your own business, sitting at your office computer. Suddenly, a pop-up appears – with the logo of the FBI – warning that you’re under investigation … Continue reading Don’t be mad at ransomware attackers, be grateful

Another Successful Information Security Summit

By Michelle Drolet . 19 Jun 2015

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in  diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to … Continue reading Another Successful Information Security Summit

Securing Your Future with a Virtual CISO

By Michelle Drolet . 17 Jun 2015

The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify and combat them. Having someone that knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance, requires the right level of expertise. Many … Continue reading Securing Your Future with a Virtual CISO

Google running late to the enterprise mobility party

By Michelle Drolet . 28 May 2015

Is Android secure enough for the enterprise? Android has a bad reputation when it comes to security, which is unfortunate because it’s the biggest mobile platform around in terms of market share. Gartner says Android claimed 80.7% of the worldwide smartphone market in 2014. We know that the BYOD trend has sparked a dramatic rise in personal mobile … Continue reading Google running late to the enterprise mobility party

Cyberattack   

Positive signs for the future of cybersecurity

By Michelle Drolet . 27 May 2015

For all the infosec hurdles to overcome, we can build a bright future if the enterprise can pull together.   We often talk about the enormous challenges facing IT departments around the world. The consumerization of IT, driven by the BYOD trend and coupled with mobility, has given birth to a wide range of serious … Continue reading Positive signs for the future of cybersecurity

Page 9 of 24« First...567891011121314...20...Last »

Tags