by gcstco | Apr 18, 2023 | Blog, News
Content Disarm and Reconstruction (CDR) is an old technique, used by defence systems to protect themselves from malware. The idea is to deconstruct a file into its parts, remove any parts that are executable code or scripts, and then reconstruct the file, making...
by gcstco | Apr 17, 2023 | Blog, News
The mass distribution of wiper malware continues to showcase the destructive evolution of cyberattacks. Does the evidence corroborate the theory that the ongoing conflict in Europe is to blame for the rise in wipers? Indeed. Furthermore, given that Russia is...
by gcstco | Apr 14, 2023 | Blog, News
IT companies were the first to go open source, and many large businesses followed suit. After all, the ability to reuse and independently modify code as well as fix bugs spurs rapid innovation and cost reduction. But open source has some inherent negative...
by gcstco | Apr 13, 2023 | Blog, News
Cloud strategy has never been more top of mind for technology leaders around the world. The pandemic has fueled rapid acceleration of cloud adoption, but new trends in cloud usage are emerging in today’s world of economic uncertainty and budget constraints. The...
by gcstco | Apr 12, 2023 | Blog, News
AI is definitely the hot topic right now, and a lot of people are throwing around or downright parroting information and opinions. Invicti’s CTO and Head of Security Research, Frank Catucci, spoke to Mike Shema on episode #234 of the Application Security Weekly...
by gcstco | Apr 11, 2023 | Blog, News
As organizations continue to adopt SaaS applications at an accelerating pace, there’s a growing focus among IT leaders on cost optimization to eliminate the waste associated with SaaS subscriptions. Gartner® estimates the average company wastes 25% of their...