GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Blogs

Data Storage Solutions
One of the issues that actually prevents companies from increasing that spend is the head-spinning number of options that can be utilized. They're blinded by the storage light.
software storage
Software-defined storage is storage virtualization combined with services and functionality independent from the hardware used.
ATM security
It should come as no surprise to learn that there is malware that targets ATMs. It makes perfect sense: ATMs run software, require connectivity and are stuffed with cash.
Google cybersecurity
As if they don't have enough going on, Google just launched its first cybersecurity company.
Broadband access
The U.S. government has introduced a plan called the American Broadband Initiative (ABI) to ramp up broadband deployment to millions of Americans in rural communities.
Dunkin Donuts
Sugary sweet giant Dunkin’ Donuts was hit with its second cyber-attack in three months. Both attacks can be filed in a cyberattack category you may not have heard of—credential stuffing.
DCIM (Data Center Infrastructure Management)
DCIM combines the more glamorous IT with physical assets, the oft-ignored, but vitally important “offensive linemen of the data center.”
Security myths
According to the National Cyber Security Center, the cyber arm of Great Britain’s GCHQ, these are the two most common myths concerning network security.
Bleichenbacher attack
A new cryptographic attack allows attackers to intercept data believed to be secure through TLS. The researchers who identified it have dubbed it ROBOT, an acronym for Return of Bleichenbacher’s Oracle Threat.