Are mobile apps truly enterprise-secure?

By Michelle Drolet . 9 May 2013

Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise … Continue reading Are mobile apps truly enterprise-secure?

A case for the Growing Need for Application Security.

By Michelle Drolet . 9 May 2013

Islamist Element in Attacks. A pro-Islamic, anti-American hacking campaign appears to have jumped the gun and started early with hundreds of sites being compromised today. Set to take place on May 7 this month – thought to be US time – and targeting government sites in the US, Israel and India, the campaign is called … Continue reading A case for the Growing Need for Application Security.

Free Security Tools, Apps, and Widgets

By Michelle Drolet . 5 Apr 2013

Our friends at Trend Micro offer a range of free tools, apps and widgets to protect your devices and help you manage your online activity. You can check them out and download them for free on our Security Tools, Apps, and Widgets Page.

How to ensure mobile apps are secure for the enterprise

By Michelle Drolet . 12 Feb 2013

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts … Continue reading How to ensure mobile apps are secure for the enterprise

BYOD Brings on a War of Worry

By Michelle Drolet . 28 Jan 2013

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in … Continue reading BYOD Brings on a War of Worry

Warning: Java vulnerable to hackers, U.S. government says

By Michelle Drolet . 11 Jan 2013

Jan 11 (Reuters) – The U.S. Department of Homeland Security urged computer users to disable Oracle Corp’s (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts’ prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web. Hackers have figured out how to exploit Java to install malicious software enabling them to … Continue reading Warning: Java vulnerable to hackers, U.S. government says

Introducing Towerwall’s eBook Series with “Beware of BYOD”

By Michelle Drolet . 28 Nov 2012

Towerwall is proud to announce our eBook Series with “Beware of BYOD: How forward-thinking companies can cope with ‘Bring your own Device’” The BYOD dilemma is putting undue strain on employer-employee relations, shaking up how organizations approach IT security, posing new risks and challenges. To download your Free eBook, please visit our eBook & White … Continue reading Introducing Towerwall’s eBook Series with “Beware of BYOD”

Trust Your Third-Party Applications? Think Again….

By Michelle Drolet . 28 Nov 2012

Don’t assume those third-party apps you buy are fully secure. Despite the promise of cloud computing, companies are still buying software. And it is more cost effective to buy an application and plug it into your system than it is to develop anew. How many third-party applications has your company bought off the shelf? How … Continue reading Trust Your Third-Party Applications? Think Again….

Top 10 PHP Security Vulnerabilities

By Michelle Drolet . 23 Oct 2012

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential … Continue reading Top 10 PHP Security Vulnerabilities

Dealing with Phishing Messages

By Michelle Drolet . 18 Oct 2012

According to the article in Dark Reading,  Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, … Continue reading Dealing with Phishing Messages

Tags