Michelle Drolet profiled in Boston Voyager
Today we’d like to introduce you to Michelle Drolet… Thanks for sharing your story with us Michelle. So, let’s start at the beginning and we can move on from there. As founder of Towerwall, I have to...
View Article8 Cybersecurity Trends to Watch for in 2018
New challenges and threats will face IT departments in the year ahead. As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017,...
View ArticleMeetup: ARMIS IoT Security – Thursday, January 11, 2018
Join us for our next InfoSec at Your Services Meetup: “ARMIS IoT Security” Hosted by Michelle Drolet When: Thursday, January 11, 2018 6:30 PM to 8:00 PM Where: Skyboxx, 319 Speen Street, Natick We will...
View ArticleJoin us for a Dinner Seminar with Darktrace – Wednesday, January 17, 2018
Towerwall & Darktrace Dinner Seminar Hosted by Towerwall When: Wednesday, January 17, 2018 6:00 PM to 8:00 PM Where: Il Capriccio 888 Main St, Waltham, MA 02453 To Register: Contact Kelley Gallo...
View Article4 Dangerous Security Assumptions to Avoid
Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think....
View ArticleThe 7 Deadly Sins of Endpoint Detection & Response
Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital...
View ArticleWhy Penetration Testing Is Critical To Bolster Your Cybersecurity Efforts
The threat of a cybercriminal gaining access to your network is a constant source of anxiety. Amid all of the high-profile data breaches, businesses and organizations of all sizes have been...
View ArticleBuild A Strong Cybersecurity Posture With These 10 Best Practices
The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase...
View Article10 Things I know about … Working from home
10) Zooming out. Video conferencing is a two-edged sword; while a boon to nurture group discussion, the degree of focus paid to a small screen while feeling self-conscious (how’s my hair?) can...
View Article6 Steps to Building a Strong Breach Response Plan
Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here’s how to get started. No matter how secure your business, data breaches are an...
View Article
More Pages to Explore .....