by gcstco | Jul 5, 2022 | Blog, News
A good criminal needs to know what makes people tick. There is a great deal of psychology involved in criminal activities – especially when it comes to establishing contact with potential victims. Many cyberattacks are successful because cyber criminals misuse...
by gcstco | Jul 4, 2022 | Blog, News
Data protection has become an essential part of all business strategies, no matter the company’s size. In many countries, it has become a legal obligation. Data protection legislation such as the EU General Data Protection Regulation (GDPR) and the California Consumer...
by gcstco | Jul 3, 2022 | Blog, News
If source code gets leaked or stolen, it can cause massive damage to your organization. It’s not just about financial losses – it can also decrease customers’ trust and negatively impact your reputation. That’s why source code security should be among your priorities...
by gcstco | Jun 28, 2022 | Blog, News
Data leaks have become alarmingly common of late. Cybercriminals use all kinds of tricks to gain access to databases and the records stored there. The most logical way to secure databases would be to use encryption, but this is often impractical. After all, the more...
by gcstco | Jun 27, 2022 | Blog, News
Release Overview The Remote Collector (RC) v18.00.01 release provides improved SNMP discovery for multiple devices. The most recent Main Appliance (MA) version was v18.00.00, released May 31, 2022. To download the Remote Collector v18.00.01, please...
by gcstco | Jun 23, 2022 | Blog, News
It’s confirmed. Broadcom is acquiring VMware. This is just the latest of many attempts at diversification by Broadcom by moving into the enterprise software space. VMware is one of the most widely adopt technologies use by organizations around the world. But what does...