by gcstco | Mar 7, 2023 | Blog, News
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To? The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive assessment framework and certification program launched by the Department of Defense to...
by gcstco | Mar 6, 2023 | Blog, News
Healthcare organizations deal with sensitive information every day and are under constant regulatory pressure to keep this data safe. Invicti sat down with a large healthcare customer to learn how taking a DAST-based approach has helped to minimize application...
by gcstco | Mar 3, 2023 | Blog, News
The European Commission invited interested stakeholders to provide feedback on the “Proposal for the Regulation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU)...
by gcstco | Mar 2, 2023 | Blog, News
ChatGPT has made quite a splash in recent weeks. The AI-supported chatbot impresses with its convincingly human-looking way of answering questions and interacting with users. This arouses enthusiasm as well as concerns – including in the world of IT security....
by gcstco | Mar 1, 2023 | Blog, News
When cellular phones first came out, all you could do with it was make a call. Over time, as more features were added, such as cameras and internet connectivity, those capabilities became an expected part of the phone itself. Today, even the cheapest $20 retro flip...
by gcstco | Feb 28, 2023 | Blog, News
Waste is a constant in the world of technology. That’s not hyperbole. Every year, respondents to the Flexera State of ITAM Report estimate their waste in desktop, datacenter, SaaS and cloud services at 33 percent or higher. Roughly one-third of IT budgets are being...