by gcstco | Sep 13, 2021 | Blog, News
Brazil’s Lei Geral de Proteção de Dados (LGPD) requires companies to comply with strict requirements related to the collection and processing of consumers’ personal data. We’ve reviewed the LGPD and compiled the most important ways a Data Loss Prevention (DLP)...
by gcstco | Sep 12, 2021 | Blog, News
How Does Zero Trust Security Work? Zero trust operates on the premise that there are constant threats both outside and inside the network. Zero trust also assumes that every attempt to access the network or an application is a threat. It’s a network security...
by gcstco | Sep 9, 2021 | Blog, News
How does the information companies collect fall into the wrong hands? Sometimes insiders sell it, and sometimes targeted hacking springs the leak, but most often, personally identifiable information gets out through misconfigured services or programs. Adding to...
by gcstco | Sep 9, 2021 | Blog, News
Working from home (WFH) has taken over as the new normal for employees at many organizations. Whether your outlook for extended WFH and social distancing is glass-half-full or half-empty, if you’re in IT, you’ve probably realized it drastically expands the estate...
by gcstco | Sep 7, 2021 | Blog, News
Despite the clear and growing risk of web-based attacks and data breaches, many still see web application security as a low-priority newcomer to the cybersecurity mix. This often leads to incomplete test coverage from a home-grown combination of point solutions. Let’s...
by gcstco | Sep 6, 2021 | Blog, News
For most organizations, web application security begins with solutions designed to address the Open Web Application Security Project (OWASP) Top Ten Web Application Security Risks[1]. These risks include the most common web application attack vectors, such as SQL...