by gcstco | Dec 8, 2022 | Blog, News
Reflections on what should be considered by regulators and decision-makers to actually bring more cybersecurity to digital products and services. In May 2022, the European Commission invited all interested stakeholders to share their inputs for the upcoming Cyber...
by gcstco | Nov 30, 2022 | Blog, News
Stay a step ahead in an evolving hybrid IT environment The Named User License Consumption and Optimization report has just been released in the Flexera State of ITAM Report. This report brings a unique optimization capability in the hybrid IT world of subscribed...
by gcstco | Nov 8, 2022 | Blog, News
Path traversal attacks against Java web applications can expose sensitive information and allow escalation to more dangerous attacks. This post provides an overview of Java path traversal and announces an Invicti technical paper and open-source tool. Path...
by gcstco | Oct 9, 2022 | Blog, News
Snow Software Senior Business Consultant Laura Kenny provides this 10-step guide for surviving software audits and identifying the most common audit triggers. With this guide, IT professionals can face the audit process with confidence and experience an optimized and...
by gcstco | Oct 5, 2022 | Blog, News
A cash wallet is where you keep your valuable cash. If you lose it, you lose your money. So you keep it physically secure at all times and don’t give it to anyone else. A digital wallet is used to store valuable digital currency. A digital wallet needs a key to open...
by gcstco | Oct 3, 2022 | Blog, News
As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC) program. Unlike most of the current state-specific US data privacy...