by gcstco | Jul 15, 2021 | Blog, News
JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...
by gcstco | Jul 14, 2021 | Blog, News
The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home – and now back to the office – have created a wide range of cyber attack vectors through personal and unauthorized...
by gcstco | Jul 13, 2021 | Blog, News
What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen? Last week our alert system notified us of a possible false positive...
by gcstco | Jul 13, 2021 | Blog, News
Outstanding service quality begins with satisfied employees. In the healthcare sector in particular, employees who feel good about themselves are enormously important, because patient well-being greatly depends on the good work that the staff provides. With the right...
by gcstco | Jul 13, 2021 | Blog, News
As enterprises in some parts of the world begin to re-open, it’s clear that hybrid work is here to stay, with some workforce returning to the office and others remaining remote. Now, to support this seismic shift in the way organizations and teams work and keep...