Michelle Drolet

Contributor

Want to Join?
Opinions expressed by ICN authors are their own.

Michelle Drolet is a seasoned security expert with 26 years of experience providing organizations with IT security technology services. Prior to founding Towerwall (formerly Conqwest) in 1993, she founded CDG Technologies, growing the IT consulting business from two to 17 employees in its first year. She then sold it to a public company and remained on board. Discouraged by the direction the parent company was taking, she decided to buy back her company. She re-launched the Framingham-based company as Towerwall. Her clients include Biogen Idec, Middlesex Savings Bank, PerkinElmer, Raytheon, Smith & Wesson, Covenant Healthcare and many mid-size organizations.

A community activist, she has received citations from State Senators Karen Spilka and David Magnani for her community service. Twice she has received a Cyber Citizenship award for community support and participation. She's also involved with the School-to-Career program, an intern and externship program, the Women’s Independent Network, Young Women and Minorities in Science and Technology, and Athena, a girl’s mentorship program.

Michelle is the founder of the Information Security Summit at Mass Bay Community College. Her numerous articles have appeared in Network World, Cloud Computing, Worcester Business Journal, SC Magazine, InfoSecurity, Wired.com, Web Security Journal and others.

The opinions expressed in this blog are those of Michelle Drolet and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

7 things to consider when choosing managed detection and response

10 (more) free security tools worth a look

10 (more) free security tools worth a look

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free.

The CCPA is an opportunity to get your data security house in order

The CCPA is an opportunity to get your data security house in order

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue.

5 ways to improve your security posture in 2020

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

8 common pen testing mistakes and how to avoid them

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

5 cloud security basics and best practices

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security.

Are you taking third-party risk seriously enough?

Are you taking third-party risk seriously enough?

Because third parties are often responsible for data breaches, your internal security standards must extend beyond your borders to cover vendors and other external partners.

Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent...

How a decentralized cloud model may increase security, privacy

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.

4 tips for getting the most from threat intelligence

4 tips for getting the most from threat intelligence

It’s easy to gather data on potential threats, but you have to know what to do with that intelligence if you want to improve your security stance.

What is Emotet? And how to guard against this persistent Trojan malware

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here's what you can do to safeguard your business.

Whip your information security into shape with ISO 27001

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular...

Load More