by gcstco | Jan 3, 2022 | Blog, News
Securing the Perimeter of Higher Education – A Fireside Chat with SUNY Plattsburgh . higher education is an important cornerstone in any advance society. It is where individuals in search of knowledge gather to discuss and challenge ideas, conduct groundbreaking...
by gcstco | Jan 2, 2022 | Blog, News
Data Security: What Broadcasters Need to Know . The last decade has brought a massive shift in how broadcasting companies operate. Video-on-demand, mobile applications, and streaming services have diversified the way audiences access content and have put pressure on...
by gcstco | Dec 30, 2021 | Blog, News
Three Advantages of Integrated Security at the LAN Edge . The LAN edge presents a broad and potentially vulnerable target for cyber criminals, and many LAN solutions lack built-in security, so they end up being secured with add-on solutions that add cost and...
by gcstco | Dec 29, 2021 | Blog, News
Four ways to find spy cameras. How to check for hidden cameras in a hotel room or rented apartment. Leonid GrustniyDecember 20, 2021 To the average person, directional microphones, hidden cameras, and other surveillance equipment are the stuff of spy movies. Yet such...
by gcstco | Dec 28, 2021 | Blog, News
Tracking Down Log4j: Where to Start . Device42 recommends a prioritized approach to identify targets with recently discovered log4j vulnerability. Priority 1: Check public-facing serversPriority 2: Check applications with sensitive information and/or those with...