by gcstco | Dec 20, 2021 | Blog, News
Marketing and Advertising Companies: Data Security Best Practices . Marketing and advertising companies need to tackle new customers needs and expectations while aligning their processes and practices to new privacy requirements and technical developments. In a...
by gcstco | Dec 19, 2021 | Blog, News
Defending Connected SAP Systems Against Emerging Threats Using Deception Technology . By Moshe Ben Simon | December 16, 2021 Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today’s organizations. One...
by gcstco | Dec 16, 2021 | Blog, News
OWOWA malicious IIS module . The malicious Internet Information Services module makes Outlook on the web a cybercriminal tool. Kaspersky TeamDecember 14, 2021 A malicious Internet Information Services (IIS) module is turning Outlook on the web into a tool for stealing...
by gcstco | Dec 15, 2021 | Blog, News
Log4j Zero-Day . How Device42 can help Device42’s discovery capability can help you identify systems vulnerable to the Log4j RCEThe Log4j vulnerability is critical and impacts many applications and systemsDevice42’s software is not impact by the Log4j vulnerability...
by gcstco | Dec 13, 2021 | Blog, News
Five fundamental tips for getting executive buy-in on AppSec . The need for effective cybersecurity programs has never been more apparent. By October of 2021, the number of data breaches leapfrogged the total from 2020 by 17%, and 2021 saw the highest average data...