by gcstco | Jan 10, 2022 | Blog, News
Common spear-phishing tricks . To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails. Roman DedenokDecember 24, 2021 Virtually every employee of a large company comes across the occasional...
by gcstco | Jan 9, 2022 | Blog, News
Enhanced and Additional SNMP Discovery Support and Resolved Issues in Remote Collector v17.08.03 . Release Overview The Remote Collector v17.08.03 release includes enhanced SNMP autodiscovery support and several bug fixes. The most recent Main Appliance (MA) version...
by gcstco | Jan 6, 2022 | Blog, News
Apache Log4j 2, Flexera and you . By now, you’ve probably learned of Apache Log4j 2. As reported across the web, there is the recently disclosed CVE-2021-44228 vulnerability in Apache Log4j 2 (widely referred to as Log4Shell) affecting organizations far and wide. This...
by gcstco | Jan 5, 2022 | Blog, News
Looking back at 2021 in cybersecurity with Netsparker . As 2021 draws to a close, it is time for our customary round-up of the year’s most popular and relevant posts on the Netsparker blog, with a sprinkling of last-minute news and predictions for the coming year. A...
by gcstco | Jan 4, 2022 | Blog, News
By Jennifer Kuvlesky | December 22, 2021SaaS Management Improving SaaS Visibility: 3 Ways to Provide Guardrails Not Gates . New hybrid work models are continuing to cause significant shifts both in where employees work and in how organizations procure technology. With...
by gcstco | Jan 3, 2022 | Blog, News
Securing the Perimeter of Higher Education – A Fireside Chat with SUNY Plattsburgh . higher education is an important cornerstone in any advance society. It is where individuals in search of knowledge gather to discuss and challenge ideas, conduct groundbreaking...