Michelle Drolet

Want to Join?
Opinions expressed by ICN authors are their own.

Michelle Drolet is a seasoned security expert with 26 years of experience providing organizations with IT security technology services. Prior to founding Towerwall (formerly Conqwest) in 1993, she founded CDG Technologies, growing the IT consulting business from two to 17 employees in its first year. She then sold it to a public company and remained on board. Discouraged by the direction the parent company was taking, she decided to buy back her company. She re-launched the Framingham-based company as Towerwall. Her clients include Biogen Idec, Middlesex Savings Bank, PerkinElmer, Raytheon, Smith & Wesson, local SMBs and law firms.

A community activist, she has received citations from State Senators Karen Spilka and David Magnani for her community service. Twice she has received a Cyber Citizenship award for community support and participation. She's also involved with the School-to-Career program, an intern and externship program, the Women’s Independent Network, Young Women and Minorities in Science and Technology, and Athena, a girl’s mentorship program.

Michelle is the founder of the Information Security Summit at Mass Bay Community College. Her numerous articles have appeared in Network World, Cloud Computing, Worcester Business Journal, SC Magazine, InfoSecurity, Wired.com, Web Security Journal and others.

The opinions expressed in this blog are those of Michelle Drolet and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

What have we learned from WannaCry?

Learn What NIST’s Cybersecurity Framework Can Do For You

Learn What NIST’s Cybersecurity Framework Can Do For You

NIST cybersecurity framework (CSF)

Do you know where your data is?

Do you know where your data is?

Third-party risk is very real – your company’s reputation may be in your vendor’s hands.

How CISOs should address their boards about security

How CISOs should address their boards about security

CISOs can't wait until after a breach to talk with their board of directors. They must have regular discussions to ensure they're on the same page on security priorities.

7 steps to avoid getting hooked by phishing scams

7 steps to avoid getting hooked by phishing scams

Here are seven simple steps that will safeguard you and your business from phishing attacks.

Protect your unstructured data with user behavior analytics

Protect your unstructured data with user behavior analytics

Coupled with solid perimeter defenses, user behavior analytics is a powerful asset in the fight against data theft.

Botnets: Is your network really protected?

Botnets: Is your network really protected?

Security is taking a backseat as more IoT devices connect to the internet, making it possible for botnets to attack networks.

What is OWASP, and why it matters for AppSec

What is OWASP, and why it matters for AppSec

Boost your application security (AppSec) with the Open Web Application Security Project (OWASP) guidelines.

Hackers show no mercy—even for pot dispensaries

Hackers show no mercy—even for pot dispensaries

Anatomy of a national point-of-sale hack and takedown of more than 1,000 marijuana dispensaries

6 ways to launch a targeted cyberattack

6 ways to launch a targeted cyberattack

The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to...

Fighting cybercrime using IoT and AI-based automation

Fighting cybercrime using IoT and AI-based automation

Cognitive security systems could be a powerful ally in the fight against cybercrime, providing early threat detection and autonomously responding to threats.

IoT could be our downfall

IoT could be our downfall

We need to secure the internet of things.

Load More