by gcstco | Oct 17, 2021 | Blog, News
Although modern organizations host their workloads “in the cloud”, applications and services need connectivity and everything flowing between instances and users needs inspection. On AWS, organizations typically filter ingress traffic by deploying a firewall appliance...
by gcstco | Oct 14, 2021 | Blog, News
In 2017, German automotive group Verband der Automobilindustrie (VDA) set up the Trusted Information Security Assessment Exchange (TISAX), a mechanism through which organizations can submit to audits in compliance with VDA’s Information Security Assessment (ISA)....
by gcstco | Oct 13, 2021 | Blog, News
The cybersecurity skills gap has remained a top concern for CISOs, contributing to security risks, overworked IT staff, and increasing the opportunities for bad actors to exploit expanded atack surface. At the same time, the constantly evolving threat landscape...
by gcstco | Oct 4, 2021 | Blog, News
Pentagon Eyes Spring 2022 for Multiple Cloud Deployments The Department of Defense recently announced contracts for its long-awaited, multi-cloud deployment would be awarded as early as the spring of 2022. These contracts, part of the newly launched Joint Warfighter...
by gcstco | Oct 3, 2021 | Blog, News
A cybersecurity checklist for returning to the workplace. Sooner or later, most organizations will have to think about postpandemic work routines. Although many companies, still staggering from pandemic effects, have yet to make their final decisions about handling...
by gcstco | Sep 26, 2021 | Blog, News
The purpose of any security solution is to protect the system and inform users about threats. But what if your antivirus utility flags a harmless program as malware, or sounds the alarm during scanning, seemingly for no reason? There’s a name for that: false positive....