by gcstco | Oct 3, 2022 | Blog, News
As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC) program. Unlike most of the current state-specific US data privacy...
by gcstco | Oct 2, 2022 | Blog, News
Posted byZoran Cocoara September 19, 2022Posted inMacs in the enterprise In the last ten years, Macs have gradually made their way into the workplace. Their number has increased through Apple’s own efforts to improve their products for use in the enterprise such as...
by gcstco | Sep 29, 2022 | Blog, News
An unusual case of an attack executed by weaponizing legit video game code.Released on PC and consoles in September 2020, the action-adventure video game Genshin Impact was created by miHoYo Limited of China. The Windows version comes with a module combating gaming...
by gcstco | Aug 30, 2022 | Blog, News
Many application vulnerabilities found during testing originate with the web server, not the application itself. Kevin Beaver discusses the importance of web server security.Subscribe Your Information will be kept private. Much of the focus of web vulnerability...
by gcstco | Aug 24, 2022 | Blog, News
Researchers develop an AI with a 98% malware detection rate and 5% false positive rate. If you think this is a splendid technology for antivirus software, this article might change your mind. Malware detection is undecidable but not impractical Fred Cohen already gave...