Free Security Tools, Apps, and Widgets

By Michelle Drolet . 5 Apr 2013

Our friends at Trend Micro offer a range of free tools, apps and widgets to protect your devices and help you manage your online activity. You can check them out and download them for free on our Security Tools, Apps, and Widgets Page.

Top Ten Malicious Lists

By Michelle Drolet . 2 Apr 2013

Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012 Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012.   Top Ten Spammers Top 10 spam-sending countries in 2012. Rank Country 1 India 2 Saudi Arabia … Continue reading Top Ten Malicious Lists

Verify the Security of your Mobile Apps

By Michelle Drolet . 2 Apr 2013

Network World – The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise … Continue reading Verify the Security of your Mobile Apps

Mobile Devices Get Means For Tamper-Evident Forensic Auditing

By Michelle Drolet . 5 Feb 2013

The convenience of mobile devices has led to their rapid proliferation in the work place. But along with that convenience come security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security … Continue reading Mobile Devices Get Means For Tamper-Evident Forensic Auditing

Towerwall Security / Vulnerability Alert

By Michelle Drolet . 28 Jan 2013

Security researchers from the Vulnerability Lab have identified a serious security hole that could affect a number of companies which rely on Barracuda products. They’ve discovered a high severity validation filter and exception handling bypass vulnerability in Barracuda’s appliances. According to the experts, the input filter that’s designed to block out persistent input attacks is … Continue reading Towerwall Security / Vulnerability Alert

BYOD Brings on a War of Worry

By Michelle Drolet . 28 Jan 2013

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in … Continue reading BYOD Brings on a War of Worry

Beware of BYOD trend wreaking havoc

By Michelle Drolet . 19 Dec 2012

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever … Continue reading Beware of BYOD trend wreaking havoc

Compliance Combines with Vulnerability Scanning to Create Aegify

By Michelle Drolet . 11 Dec 2012

Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn’t been done before: a combination security and compliance posture management offering called Aegify SPM. The SPM stands for Security Posture Management, and eGestalt of Santa Clara … Continue reading Compliance Combines with Vulnerability Scanning to Create Aegify

Mobile Devices Get Means for Tamper-evident Forensic Auditing

By Michelle Drolet . 11 Dec 2012

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly … Continue reading Mobile Devices Get Means for Tamper-evident Forensic Auditing

Introducing Towerwall’s eBook Series with “Beware of BYOD”

By Michelle Drolet . 28 Nov 2012

Towerwall is proud to announce our eBook Series with “Beware of BYOD: How forward-thinking companies can cope with ‘Bring your own Device’” The BYOD dilemma is putting undue strain on employer-employee relations, shaking up how organizations approach IT security, posing new risks and challenges. To download your Free eBook, please visit our eBook & White … Continue reading Introducing Towerwall’s eBook Series with “Beware of BYOD”

Tags