Save the Date: Information Security Summit 2017

By Michelle Drolet . 28 Jan 2017

Click here for more information & to register! Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!  

Save the Date: Information Security Summit 2016

By Michelle Drolet . 14 Mar 2016

Click here for more information & to register! Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Full rules for protecting net neutrality released by FCC

By Michelle Drolet . 16 Mar 2015

The US Federal Communications Commission (FCC) on Thursday lay down 400 pages worth of details on how it plans to regulate broadband providers as a public utility. These are the rules – and their legal justifications – meant to protect net neutrality. They were passed last month, and details have been eagerly anticipated. The main gist of the lengthy document … Continue reading Full rules for protecting net neutrality released by FCC

Michelle Drolet quoted in TechTarget

By Michelle Drolet . 9 Mar 2015

Our Michelle Drolet is quoted in TechTarget’s article “Four ways DevOps can boost AWS security“. Read more below: Many IT teams believe security belongs to someone else. Building security into the DevOps process can be a tricky but rewarding move. Combine the “It’s not my job” belief that many IT administrators have about security tasks … Continue reading Michelle Drolet quoted in TechTarget

Introducing Towerwall’s vCISO Services

By Michelle Drolet . 23 Feb 2015

Towerwall is proud to offer our new vCISO Program. Introducing Towerwall’s vCISO Program, our unique approach to Virtual CISO. Offering three distinct partner options, our vCISO solutions are tailor fit to your organization’s security needs. Recognizing many small and mid-sized companies have security concerns, yet do not warrant a full-time position, the Towerwall vCISO Platform … Continue reading Introducing Towerwall’s vCISO Services

Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

By Michelle Drolet . 5 Feb 2015

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it’s a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as … Continue reading Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

Save the Date: Please join us at the Information Security Summit 2015

By Michelle Drolet . 5 Feb 2015

Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!   June 4, 2015  8:00AM – 1:00PM MassBay Community College 50 Oakland Street  | Wellesley Hills, MA 02481 Pre-registration required.   … Continue reading Save the Date: Please join us at the Information Security Summit 2015

Michelle Drolet published in NetworkWorld – Throw your vendor under the bus after a breach? Not quite so fast

By Michelle Drolet . 15 Jan 2015

Our Michelle Drolet is quoted in NetworkWorld’s article “Throw your vendor under the bus after a breach? Not quite so fast“. Read more below: In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and even software live in the cloud, supplied by third parties. An organization’s value is often in the data it … Continue reading Michelle Drolet published in NetworkWorld – Throw your vendor under the bus after a breach? Not quite so fast

The 4 Es of Enterprise Security

By Michelle Drolet . 15 Dec 2014

Building a solid security program takes time. Every organization is different. It’s very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once … Continue reading The 4 Es of Enterprise Security

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

By Michelle Drolet . 8 Dec 2014

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won’t happen to them. Here are five common excuses that explain why … Continue reading Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

Tags