GDT Webinar Series – How to Fail at Security? Reserve Your Spot

You searched for :security

Dunkin Donuts
Sugary sweet giant Dunkin’ Donuts was hit with its second cyber-attack in three months. Both attacks can be filed in a cyberattack category you may not have heard of—credential stuffing.
Security myths
According to the National Cyber Security Center, the cyber arm of Great Britain’s GCHQ, these are the two most common myths concerning network security.
Bleichenbacher attack
A new cryptographic attack allows attackers to intercept data believed to be secure through TLS. The researchers who identified it have dubbed it ROBOT, an acronym for Return of Bleichenbacher’s Oracle Threat.
State of the Union address
Technology was a focal point for one brief, shining moment during last night’s State of the Union address.
Insurance policy lapse
Many analysts believe the current cyber insurance market will double in the next 18 months, from $4 billion to $8 billion in premiums.
Exciting technology
Like a kid on Christmas morning, many organizations are so excited about implementing the latest and greatest technology that they're getting ahead of themselves.
Technology arms race
On Monday, the DOJ held a press conference to announce that it is seeking criminal charges against Huawei, China’s mobile manufacturing giant.

Unless you consider ten (10) years in the hoosegow some odd form of payment, it’s widely known that (all together now) crime doesn’t pay. Martin Gottesfeld, 34-year-old Massachusetts knucklehead, just got reminded of it the hard way, though. He got sentenced to a decade behind bars for cyberattacking two (2)

By Richard Arneson Some things just don’t make sense, like why when a baseball hits the foul pole it’s a fair ball. Shouldn’t it be called the fair pole? Or why hot dogs come in packs of ten (10) but the buns in quantities of eight (8). Oh, and how