by gcstco | Jul 15, 2021 | Blog, News
Zero Trust promotes the concept that organizations should not trust any entity inside or outside their network perimeters in a predetermined fashion.Adoption of the Zero Trust security model is picking up steam at last. In February 2020 – before the pandemic swept the...
by gcstco | Jul 15, 2021 | Blog, News
So, you’re in negotiations with Microsoft for a renewal and have investments across on-premises applications, Microsoft O365 and Azure—how do you leverage your current customer acumen in tandem with deep product knowledge to avoid ending up with an uncomfortable...
by gcstco | Jul 15, 2021 | Blog, News
JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...
by gcstco | Jul 14, 2021 | Blog, News
The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home – and now back to the office – have created a wide range of cyber attack vectors through personal and unauthorized...
by gcstco | Jul 13, 2021 | Blog, News
What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen? Last week our alert system notified us of a possible false positive...
by gcstco | Jul 13, 2021 | Blog, News
Outstanding service quality begins with satisfied employees. In the healthcare sector in particular, employees who feel good about themselves are enormously important, because patient well-being greatly depends on the good work that the staff provides. With the right...