Industry Insight from our Team

We offer eBooks and white papers that provide an in-depth view and analysis on a wide range of topics in information security.

Understanding Gramm-Leach-Bliley Act (GLBA) and What it Means for Schools and Colleges

Organizations face significant threats from cyber attackers who want to profit from unlawful access to their data. Cybersecurity incidents are on the rise and according to the Cyber Security and Breach Trends report, such incidents doubled in 2017 from the previous year.

This whitepaper takes a look at one such compliance called the Gramm-Leach-Bliley Act (GLBA) and how it impacts education institutes.

Why Should I Care About Privacy & GDPR?

Are you ready for GDPR? Do you meet the new requirements? Do you know your risk exposure? A lot of companies do not know. To give you an idea of the uncertainty surrounding the Regulation, Vanson Bourne surveyed 1,600 organizations.  37% of respondents didn’t know whether their organization needed to comply with GDPR, while 28% believe they don’t need to comply at all. This uncertainty will not provide any protection from fines.

What NIST’s Cybersecurity Framework Can Do For You

The NIST Cybersecurity Framework (CSF) provides a set of computer security policies and guidelines for how organizations can assess and improve their ability to prevent, detect, and respond to cyber-attacks. It provides a high-level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes. In short, the NIST CSF helps organizations to be proactive about risk management.

Banking Cannabis

Walk through with Towerwall as we tell you “The Information You Need to Know to Build a Successful Banking Cannabis Program.”



20 Critical Security Controls as Proposed by the Center for Internet Security

This eBook strives to make the 20 security controls as described in detail by the SANS institute more accessible to everyday business people.

How to Build a Security Operations Center (On a Budget)

Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You’ll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

7 Secrets of Offensive Security

With all the breaches happening in the news, isn’t it time you get one step ahead of the next threat? Get proactive and learn these secrets before you become the next victim.

Ransomware Guide for Healthcare Providers

Healthcare providers have always been attractive targets for data breaches. Why? The value of a health record is high. According to Reuters, health records are 10 to 20 times more valuable than credit card numbers.

Beware of BYOD

The BYOD dilemma is putting undue strain on employer-employee relations, shaking up how organizations approach IT security, posing new risks and challenges.