Deciding Between Vulnerability Scanning And Penetration Testing

By Michelle Drolet . 8 May 2014

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test … Continue reading Deciding Between Vulnerability Scanning And Penetration Testing

Reminder: Please join us at the Information Security Summit 2014

By Michelle Drolet . 7 May 2014

Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!   May 29, 2014  8:00AM – 1:00PM MassBay Community College 50 Oakland Street  | Wellesley Hills, MA 02481 Early Bird Special: … Continue reading Reminder: Please join us at the Information Security Summit 2014

The Benefits of Cloud-Based Endpoint Security

By Michelle Drolet . 2 May 2014

The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cloud-based IT security systems can be an ideal fit for … Continue reading The Benefits of Cloud-Based Endpoint Security

Why security professionals need to get more creative with penetration testing (and how to do it)

By Michelle Drolet . 25 Apr 2014

Criminals are evolving with their techniques for hacking and breaching corporate assets, so security managers need to as well. Here are some ways companies are going beyond standard pen testing in order to increase awareness By Maria Korolov  Security professionals have long been running penetration tests against their firewalls and other security systems to find … Continue reading Why security professionals need to get more creative with penetration testing (and how to do it)

Is Blind Trust Making You Unsafe?

By Michelle Drolet . 14 Apr 2014

Personal and business relationships rely on trust to function, but blind trust in the digital world is downright dangerous. We’re asked to trust companies all the time. We trust them with personal details and they promise to keep them safe. It’s the same story in the enterprise. One company will entrust another to backup and … Continue reading Is Blind Trust Making You Unsafe?

Towerwall Heartbleed Vulnerability Alert

By Michelle Drolet . 11 Apr 2014

Good Afternoon: The IT infrastructure your organization may use for day-to-day business may be vulnerable because of the Heartbleed vulnerability. Sophos a Towerwall partner has prepared a podcast of the Heartbleed vulnerability, which addresses who is likely affected, workarounds and an offer to help determine if you are vulnerable. http://nakedsecurity.sophos.com/2014/04/10/sscc-142-heartbleed-explained-patches-evaluated-apple-chastised-podcast/ If you think you may … Continue reading Towerwall Heartbleed Vulnerability Alert

Towerwall Information/Vulnerability Alert Vol 13.69: Cisco Security Notice

By Michelle Drolet . 20 Mar 2014

Cisco Security Notice Cisco WebEx Business Suite HTTP GET Parameters Include Sensitive Information CVE ID: CVE-2014-0708 Release Date: 2014 March 18 19:07  UTC (GMT) Last Updated: 2014 March 19 17:58  UTC (GMT)SummaryA vulnerability in Cisco WebEx Business Suite could allow an unauthenticated, remote attacker to view sensitive information transmitted in GET parameters of URL requests.   The vulnerability is due to inclusion of sensitive … Continue reading Towerwall Information/Vulnerability Alert Vol 13.69: Cisco Security Notice

Successful Breakfast Event: From Zero to Data Governance Hero

By Michelle Drolet . 14 Mar 2014

Thanks for all that joined Towerwall at the From Zero to Data Governance Hero breakfast event! Towerwall and Varonis experts gave first-rate information on the importance of pressing data concerns of 2014. Also, Varonis’ speaker gave a great live demonstration on the Data Governance Suite! It was an event well spent! “Towerwall is always looking … Continue reading Successful Breakfast Event: From Zero to Data Governance Hero

Towerwall Information Security/Malware Alert Vol 13.67 – Notorious “Gameover” malware gets itself a kernel-mode rootkit…

By Michelle Drolet . 3 Mar 2014

Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security. We’ve covered it as plain old Zbot. We’ve covered the Citadel variant, which appeared when the original Zbot code was leaked online. We’ve even written about the time it pretended to be a Microsoft fix for CryptoLocker, a completely different … Continue reading Towerwall Information Security/Malware Alert Vol 13.67 – Notorious “Gameover” malware gets itself a kernel-mode rootkit…

Stay Secure in the Cloud with Sophos Cloud Endpoint

By Michelle Drolet . 20 Feb 2014

Towerwall and Sophos, partnering to protect data integrity in the cloud. Towerwall is now offering Sophos Cloud Endpoint, a new security option for small and medium sized businesses. Sophos Cloud Endpoint offers an integrated, lightweight agent that protects your business, users and their computers. 24/7, anywhere in the cloud. Sophos Cloud Endpoint gives you endpoint … Continue reading Stay Secure in the Cloud with Sophos Cloud Endpoint

Tags