Protect your unstructured data with user behavior analytics

By Michelle Drolet . 4 Apr 2017

User behavior analytics sniffs out anomalies in users’ actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its … Continue reading Protect your unstructured data with user behavior analytics

Michelle Drolet Talks to tED Magazine about How Companies Can Prepare for a Security Breach

By Michelle Drolet . 4 Jan 2017

Our own Michelle Drolet sits down with tED Magazine to discuss what security measures companies can take to protect their data. Read the full article >    

IoT Could Be Our Downfall

By Michelle Drolet . 3 Jan 2017

We need to secure the internet of things. The internet of things (IoT) is all about connecting devices to the internet so that they can talk to each other and to us, to make life more convenient. That might mean turning on the lights when we get up, or allowing us to use our phones … Continue reading IoT Could Be Our Downfall

What is the General Data Protection Regulation and why should you care?

By Michelle Drolet . 15 Nov 2016

Find out how to prepare for new EU legislation on data collection and security In 2012, the European Commission proposed new regulations on data protection that would supersede the national laws of the 28 EU member states. It was formally approved in April this year, and it will go into effect May 25, 2018. This … Continue reading What is the General Data Protection Regulation and why should you care?

Does the NSA have a duty to disclose zero-day exploits?

By Michelle Drolet . 26 Sep 2016

The NSA should disclose all zero-day exploits. But it doesn’t.   To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.” … Continue reading Does the NSA have a duty to disclose zero-day exploits?

Information Security Summit 2016 Raises $5,000 for MassBay Cyber Security Scholarships

By Michelle Drolet . 31 Aug 2016

WELLESLEY HILLS, MA (August 2016) – Massachusetts Bay Community College is pleased to announce it has received a generous donation of $5,000 from this year’s annual Information Security Summit to support student scholarships in the field of cyber security. The Information Security Summit, held each year on MassBay Community College’s Wellesley Hills campus, was established … Continue reading Information Security Summit 2016 Raises $5,000 for MassBay Cyber Security Scholarships

Hired guns: The rise of the virtual CISO

By Michelle Drolet . 19 Aug 2016

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and … Continue reading Hired guns: The rise of the virtual CISO

7 Secrets of Offensive Security – SnoopWall & Towerwall Lunch & Learn Session on August 16, 2016

By Michelle Drolet . 8 Aug 2016

7 Secrets of Offensive Security Please join us for a complimentary Lunch & Learn session. Tuesday, August 16 11:00 am – 1:00 pm EST Sheraton Framingham Hotel, Framingham, MA *EARN CPE CREDITS   In this session you will learn: The 7 Secrets of Oensive Security. With all the breaches happening in the news, isn’t it … Continue reading 7 Secrets of Offensive Security – SnoopWall & Towerwall Lunch & Learn Session on August 16, 2016

Cybersecurity is only as strong as your weakest link—your employees

By Michelle Drolet . 28 Jul 2016

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17   You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most … Continue reading Cybersecurity is only as strong as your weakest link—your employees

LinkedIn Data Breach Still Causing Problems

By Michelle Drolet . 21 Jun 2016

Failing to take basic security precautions with website passwords puts your data at risk   Do you remember back in 2012 when LinkedIn was hacked? Around 6.5 million user passwords were posted on a Russian blog. There was a mandatory password reset for affected users, and LinkedIn released a statement advising people to enable two-step … Continue reading LinkedIn Data Breach Still Causing Problems

Tags