Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

By Michelle Drolet . 10 May 2017

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer’s specific needs.   “Security is not one-size-fits-all, so it depends on the type of organization and what their risk tolerance level is,” said Michelle Drolet, CEO at Towerwall Inc., a data … Continue reading Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

Save the Date: Information Security Summit 2017

By Michelle Drolet . 28 Jan 2017

Click here for more information & to register! Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!  

5 Cybersecurity Trends to Watch for 2017

By Michelle Drolet . 9 Jan 2017

Fresh and familiar threats to concern IT departments.   As we embark on 2017, it’s time to reflect on a year where cybersecurity has played a major role. Even presidential campaigns haven’t been free from hacking scandals and data leaks. The average cost of a data breach for companies grew from $3.8 million last year … Continue reading 5 Cybersecurity Trends to Watch for 2017

Hired guns: The rise of the virtual CISO

By Michelle Drolet . 19 Aug 2016

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and … Continue reading Hired guns: The rise of the virtual CISO

Towerwall Information Security Alert Vol 14.07 – Watch out for April Fools scamming on Friday

By Michelle Drolet . 1 Apr 2016

Watch out for April Fools scamming on Friday by Kevin Frey Annually, businesses and organizations often put up jokes or pranks for April Fools’ Day. Google, Starbucks, Amazon, etc. are frequent participants. E.g. Last year, Amazon revamped their site to look their old, original 1999 version… and Google (known for multiples) turned its “Maps” app … Continue reading Towerwall Information Security Alert Vol 14.07 – Watch out for April Fools scamming on Friday

Do you have the right person for the job?

By Michelle Drolet . 14 Mar 2016

According to Cisco’s 2015 Annual Security Report, 91 percent of companies have an executive with direct responsibility for security, but only 29 percent of them have a Chief Information Security Officer. The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify … Continue reading Do you have the right person for the job?

Save the Date: Information Security Summit 2016

By Michelle Drolet . 14 Mar 2016

Click here for more information & to register! Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

10 Things I Know About…Hiring a vCISO

By Michelle Drolet . 15 Feb 2016

10. A hedge against a breach A virtual chief information security officer can serve as security consul or as an interim CISO to fill the gaps during a planned information-technology security policy review. Better to be safe than sorry.   9. High talent at low costs As a temp hire, a vCISO offers flexibility and … Continue reading 10 Things I Know About…Hiring a vCISO

Applying more Critical Security Controls to your organization

By Michelle Drolet . 4 Dec 2015

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we’re going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. … Continue reading Applying more Critical Security Controls to your organization

Securing Your Future with a Virtual CISO

By Michelle Drolet . 17 Jun 2015

The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify and combat them. Having someone that knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance, requires the right level of expertise. Many … Continue reading Securing Your Future with a Virtual CISO

Tags