eBook Series   

Free eBook: Revolutionizing Zero Trust with Software-Defined Perimeter

By Michelle Drolet . 18 Nov 2019

Free eBook: Revolutionizing Zero Trust with Software-Defined Perimeter Enterprise access requirements are growing ever more complex due to application dynamics, cloud adoption and mergers. To cut through this complexity, technical professionals should explore SDP – a new technology whose strength lies in facilitating access to enterprise apps. Safe-T’s Software-Defined Access Suite takes SDP to the … Continue reading Free eBook: Revolutionizing Zero Trust with Software-Defined Perimeter

eBook Series   

Free eBook: Vigilance & Diligence: How to Protect Your Company From Cybersecurity Threats

By Michelle Drolet . 1 Nov 2019

Free eBook: Vigilance & Diligence: How to Protect Your Company From Cybersecurity Threats Staying abreast of the latest cybersecurity trends can be a tricky challenge for modern businesses, but it’s absolutely vital if you want to safeguard your data. Plugging vulnerabilities, keeping your cloud secure, and avoiding phishing scams and ransomware attacks requires diligence, user … Continue reading Free eBook: Vigilance & Diligence: How to Protect Your Company From Cybersecurity Threats

Michelle Drolet Celebrates Milestone with Forbes Technology Council

By Michelle Drolet . 25 Oct 2019

Forbes Technology Council Is an Invitation-Only Community for Executives Leading Their Industry   BOSTON – October 25, 2019 — Michelle Drolet, CEO of Towerwall, is celebrating her one-year anniversary as a member of the Forbes Technology Council, an invitation-only organization for senior leaders to publish original content, connect and excel. “We are so pleased to … Continue reading Michelle Drolet Celebrates Milestone with Forbes Technology Council

Webinars   

Webinar: Edge Computing Association Webinar How to Use the Decentralized Edge Cloud to Protect Your Data

By Michelle Drolet . 16 Oct 2019

Expert panelists Michelle Drolet of Towerwall and Tom Ward of Qnext/FileFlex joined participants online on October 1st 2019 to speak about how to use a decentralized edge-cloud architecture to secure your company’s files & data and prevent cybersecurity threats and ransomware attacks. Watch the full webinar below:

Watch & Listen to Michelle Drolet on Radio Entrepreneurs

By Michelle Drolet . 7 Oct 2019

Our own Michelle Drolet sits down with Jeffrey Davis, founder and host of Radio Entrepreneurs to share her story and lessons learned as an entrepreneur. Watch above or click here to listen > Radio Entrepreneurs shares the stories of entrepreneurs in the interest of giving more exposure to innovative and fast-moving companies while creating a … Continue reading Watch & Listen to Michelle Drolet on Radio Entrepreneurs

The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

By Michelle Drolet . 7 Oct 2019

One of the biggest challenges about working in cybersecurity is that you’re facing an enemy who learns and adapts. Cybercriminals can be very organized, they cooperate, and they’re constantly working to develop new techniques and strategies that will breach your defenses. They’re also growing increasingly adept at sniffing out the best opportunities to extract maximum … Continue reading The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

7th Annual Information Security Summit Recap

By Michelle Drolet . 11 Sep 2019

Thank you to all who attended this year’s Information Security Summit! Please see the video recap below. Looking forward to seeing everyone next year!

News & Events    Webinars   

Webinar: Delivering Secure & Compliant Remote File Access with Decentralized Cloud Computing – 10/1/19

By Michelle Drolet . 11 Sep 2019

How to secure remote file access, sharing and collaboration with decentralized cloud computing. When: Tuesday, October 1, 2019 – 2:00 PM EST Sponsored by: Sponsored by Towerwall and Qnext Presented by: Michelle Drolet, Paul Barker Register now >  

News & Events    Webinars   

Webinar: 7 Best Practices for Securing the Public Cloud – 9/17/19

By Michelle Drolet . 11 Sep 2019

Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, … Continue reading Webinar: 7 Best Practices for Securing the Public Cloud – 9/17/19

Build A Strong Cybersecurity Posture With These 10 Best Practices

By Michelle Drolet . 15 Apr 2019

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks. We are looking at a state-of-affairs wherein it is very easy for cybercriminals to exploit security vulnerabilities and target … Continue reading Build A Strong Cybersecurity Posture With These 10 Best Practices

Tags