GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Cybersecurity

As the head of GDT’s security practice and an industry veteran, Jeanne Malone and her team help customers worldwide advance their cybersecurity posture. One of the biggest cybersecurity game-changers is artificial intelligence (AI). We asked Jeanne to weigh in on leveraging AI and machine learning in cybersecurity to improve intrusion

NCAA basketball coaching legend Bobby Knight once said: “Good basketball always starts with a good defense.” Winning teams understand their opponents’ strengths and weaknesses, as well as their own. They study their opponents’ plays and anticipate their next moves. The same concept is true for cybersecurity, which is why, at

To maintain the security and integrity of your digital assets and company information, communication is key to addressing cyberattack risks and vulnerabilities. Read on for our top 10 ideas about communicating security information to your executive team, stakeholders and board members.

The most critical phase of an incident response process is recovery. Every minute business is disrupted by a cybersecurity incident, there is signifcant cost placed on the organization. A quick recovery response can help limit costs making recovery the absolute goal of responding to an incident. Organizations cannot skip critical

Fortune favors the prepared and preparing an incident response plan will position your company to survive attacks, limit damages and minimize the business disruptions that an inevitable successful attack can cause. Get your incident response team ready now. Read on!
Zero Trust

In the ever-evolving landscape of Cybersecurity, Zero Trust has gained significant traction as a powerful approach to securing digital assets. Zero Trust challenges the traditional perimeter-based security model by assuming that no entity, inside or outside the network, can be trusted without verification. However, Zero Trust is not just about

One of the biggest cloud security threats your company faces isn’t malicious. In fact, it originates from inside your IT organization. Accidental misconfigurations pose one of the leading security vulnerabilities IT organizations contend with in the cloud. According to a recent study, 79% of companies had experienced a cloud data

As cyber threats increase in frequency and sophistication, despite their best efforts, most businesses will eventually fall prey to a bad actor. Are you prepared to recover? You’ve invested in state-of-the-art, end-to-end security solutions. You’ve implemented robust security and privacy policies and outlined best practices. You’ve got monitoring and detection

In today’s complex hybrid-cloud landscape, managing data protection has become more challenging than ever. Unplanned downtime caused by natural disasters, ransomware attacks, and outages poses significant threats to availability. According to a recent survey by IDC, 79% of IT and senior business leaders activated a disaster response within the past