Michelle Drolet

Want to Join?
Opinions expressed by ICN authors are their own.

Michelle Drolet is a seasoned security expert with 26 years of experience providing organizations with IT security technology services. Prior to founding Towerwall (formerly Conqwest) in 1993, she founded CDG Technologies, growing the IT consulting business from two to 17 employees in its first year. She then sold it to a public company and remained on board. Discouraged by the direction the parent company was taking, she decided to buy back her company. She re-launched the Framingham-based company as Towerwall. Her clients include Biogen Idec, Middlesex Savings Bank, PerkinElmer, Raytheon, Smith & Wesson, Covenant Healthcare and many mid-size organizations.

A community activist, she has received citations from State Senators Karen Spilka and David Magnani for her community service. Twice she has received a Cyber Citizenship award for community support and participation. She's also involved with the School-to-Career program, an intern and externship program, the Women’s Independent Network, Young Women and Minorities in Science and Technology, and Athena, a girl’s mentorship program.

Michelle is the founder of the Information Security Summit at Mass Bay Community College. Her numerous articles have appeared in Network World, Cloud Computing, Worcester Business Journal, SC Magazine, InfoSecurity, Wired.com, Web Security Journal and others.

The opinions expressed in this blog are those of Michelle Drolet and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

8 steps to secure unmanaged devices in the enterprise

10 ways to prevent, detect and recover from ransomware and zeroday threats

10 ways to prevent, detect and recover from ransomware and zeroday threats

As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail.

Why we need to be worried about deepfake videos

Why we need to be worried about deepfake videos

The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of...

4 reasons blockchain could improve data security

4 reasons blockchain could improve data security

Learn why security experts should be looking at blockchain.

The GDPR is a journey, not a destination

The GDPR is a journey, not a destination

Make sure you understand the need to operationalize data management and security.

The rise of mobile phishing attacks and how to combat them

The rise of mobile phishing attacks and how to combat them

Find out why phishing is starting to focus on mobile devices...and what you can do about it.

Eliminate the IoT security blind spot

Eliminate the IoT security blind spot

Securing the new endpoint: Making the IoT transformation safe for enterprises.

For true cybersecurity you must know what employees are doing

For true cybersecurity you must know what employees are doing

A look at some options for keeping tabs on your staff and the possible pros and cons.

5 tips to help you block ransomware

5 tips to help you block ransomware

Learn about best practices to combat the threat of ransomware.

What does stolen data cost [per second]

What does stolen data cost [per second]

58 data records are stolen every second at an average cost of $141 each.

4 steps to launch a security awareness training program

4 steps to launch a security awareness training program

Policies and software are not enough to secure your data, staff must be regularly trained.

Scan the dark web for threat intelligence

Scan the dark web for threat intelligence

It may be possible to glean valuable security insights by monitoring the dark web.

Load More