5 questions to ask your CEO about cybersecurity

By Michelle Drolet . 31 Oct 2017

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to … Continue reading 5 questions to ask your CEO about cybersecurity

Tips to Protect Your Business From Ransomware

By Michelle Drolet . 16 Aug 2017

Over the last few years we’ve observed the steady rise of ransomware with some trepidation. It is fast becoming a multi-million dollar business, and it’s getting surprisingly sophisticated. The ransomware industry is continually innovating, offering cybercriminals new technology, various business models, and all the support they need to conduct successful attacks on unsuspecting individuals and … Continue reading Tips to Protect Your Business From Ransomware

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

By Michelle Drolet . 28 Jun 2017

  Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17 Here are some of the topics discussed at this year’s … Continue reading Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

By Michelle Drolet . 10 May 2017

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer’s specific needs.   “Security is not one-size-fits-all, so it depends on the type of organization and what their risk tolerance level is,” said Michelle Drolet, CEO at Towerwall Inc., a data … Continue reading Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

AlienVault announces new training: Incident Response for USM Appliance Analysts

By Michelle Drolet . 31 Mar 2017

AlienVault recently announced a new addition to the AlienVault training portfolio: Incident Response for USM Appliance Analysts, a two-day course that we will start delivering Live and Online in May. AlienVault has had *many* requests from customers and MSSPs for training focused on the analysis of threats identified by the USM Appliance. This course provides … Continue reading AlienVault announces new training: Incident Response for USM Appliance Analysts

Botnets: Is your network really protected?

By Michelle Drolet . 27 Mar 2017

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote … Continue reading Botnets: Is your network really protected?

Congratulations to our Partner Snoopwall for Being Named One of the 50 Fastest Growing Tech Companies for 2016

By Michelle Drolet . 16 Dec 2016

The Silicon Review has declared SnoopWall is One of the 50 Fastest Growing Tech Companies for 2016.   SnoopWall, Inc. delivers breach prevention technology that helps small to medium size enterprises (SMEs) get one step ahead of the next cyber-criminal, malicious insider, phishing attacks, ransomware or zero-day malware behind the corporate firewall. Customer adoption and … Continue reading Congratulations to our Partner Snoopwall for Being Named One of the 50 Fastest Growing Tech Companies for 2016

7 Steps to Proactive Security

By Michelle Drolet . 4 Nov 2016

The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water   Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost … Continue reading 7 Steps to Proactive Security

Always be Prepared: Monitor, Analyze and Test your Security

By Michelle Drolet . 11 Oct 2016

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20   This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down … Continue reading Always be Prepared: Monitor, Analyze and Test your Security

Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

By Michelle Drolet . 23 Jun 2016

Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16 Here are some of the topics discussed at this year’s summit: … Continue reading Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

Tags