by gcstco | Jun 2, 2022 | Blog, News
Outside-in or dynamic application security testing (DAST) has become a must-have for today’s sprawling, ever-changing, multi-tech web environments. But automated DAST can be so much more than a tool – and here are five solid reasons why it could be the future of...
by gcstco | Jun 2, 2022 | Blog, News
QR codes are everywhere these days. People use them to open websites, download apps, collect loyalty points, make payments and transfer money. This is very convenient for people, but of course there is a catch: Cybercriminals also try to cash in and have already...
by gcstco | Jun 1, 2022 | Blog, News
Some recently exposed vulnerabilities in cryptographic software highlight an old problem. Software often fails when in “exotic and rarely used configurations.” The recently-published CVE-2022-0778 vulnerability, and the related CVE-2020-0601 vulnerability, both...
by gcstco | May 31, 2022 | Blog, News
It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective how much data this truly is, one zettabyte is equal to one trillion...
by gcstco | May 29, 2022 | Blog, News
Data processing has become an integral part of every business, regardless of the industry in which they operate. While the electrical and electronics manufacturing sector does not collect consumer data on a large scale, it generates and acquires other types of highly...
by gcstco | May 25, 2022 | Blog, News
By John Maddison | May 04, 2022 Building and managing networks is hard. It requires specialized skills and training, especially today, when networks must be designed to automatically adapt to the constant pressures of digital acceleration. Ironically, this is one of...