Warning: Java vulnerable to hackers, U.S. government says

By Michelle Drolet . 11 Jan 2013

Jan 11 (Reuters) – The U.S. Department of Homeland Security urged computer users to disable Oracle Corp’s (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts’ prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web. Hackers have figured out how to exploit Java to install malicious software enabling them to … Continue reading Warning: Java vulnerable to hackers, U.S. government says

Beware of BYOD trend wreaking havoc

By Michelle Drolet . 19 Dec 2012

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever … Continue reading Beware of BYOD trend wreaking havoc

Compliance Combines with Vulnerability Scanning to Create Aegify

By Michelle Drolet . 11 Dec 2012

Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn’t been done before: a combination security and compliance posture management offering called Aegify SPM. The SPM stands for Security Posture Management, and eGestalt of Santa Clara … Continue reading Compliance Combines with Vulnerability Scanning to Create Aegify

Mobile Devices Get Means for Tamper-evident Forensic Auditing

By Michelle Drolet . 11 Dec 2012

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly … Continue reading Mobile Devices Get Means for Tamper-evident Forensic Auditing

Introducing Towerwall’s eBook Series with “Beware of BYOD”

By Michelle Drolet . 28 Nov 2012

Towerwall is proud to announce our eBook Series with “Beware of BYOD: How forward-thinking companies can cope with ‘Bring your own Device’” The BYOD dilemma is putting undue strain on employer-employee relations, shaking up how organizations approach IT security, posing new risks and challenges. To download your Free eBook, please visit our eBook & White … Continue reading Introducing Towerwall’s eBook Series with “Beware of BYOD”

Trust Your Third-Party Applications? Think Again….

By Michelle Drolet . 28 Nov 2012

Don’t assume those third-party apps you buy are fully secure. Despite the promise of cloud computing, companies are still buying software. And it is more cost effective to buy an application and plug it into your system than it is to develop anew. How many third-party applications has your company bought off the shelf? How … Continue reading Trust Your Third-Party Applications? Think Again….

Fake PayPal Emails Distributing Malware

By Michelle Drolet . 31 Oct 2012

Everyday there is a new threat with seemingly innocent emails being sent out that look close to an official correspondence from a company, from Paypal, ADP and BBB – to name a few. Cybercriminals are mimicking the online payment processor PayPal in a malicious spam campaign that attempts to dupe customers into downloading malware from … Continue reading Fake PayPal Emails Distributing Malware

Top 10 PHP Security Vulnerabilities

By Michelle Drolet . 23 Oct 2012

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential … Continue reading Top 10 PHP Security Vulnerabilities

Dealing with Phishing Messages

By Michelle Drolet . 18 Oct 2012

According to the article in Dark Reading,  Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, … Continue reading Dealing with Phishing Messages

Introducing Towerwall’s VOIP Assessment Services

By Michelle Drolet . 15 Oct 2012

Towerwall is proud to offer our new VOIP Assessment Services. Do you know if your VoIP phones and servers are segmented from the rest of your network? Even if they are, segmentation alone may not protect your voice assets. Towerwall, Inc. has developed an approach that is extremely effective in testing the security of VoIP … Continue reading Introducing Towerwall’s VOIP Assessment Services

Tags