GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Cybersecurity

Hiring a hacker

By Richard Arneson In just nine (9) short years, ridesharing company Uber has risen from a small, San Francisco-based startup to a highly disruptive, $6.5 billion juggernaut that, along with its competitor Lyft, has given over 2 million people with a car and spare time on their hands the opportunity

Phishing is up

By Richard Arneson We’re entering the holiday season, which used to mean trips to the mall, circling the parking lot for a spot within a hundred yards of the door, and trying to get the clerk to accept a coupon that expired a year ago. But that’s all changed. Now

Texas A&M cyber threats

By Richard Arneson Some things just don’t make sense, like why when a baseball hits the foul pole it’s a fair ball. Shouldn’t it be called the fair pole? Or why hot dogs come in packs of ten (10) but the buns in quantities of eight (8). Oh, and how

Malware

By Richard Arneson Hopefully the answer is a resounding “NO”, but the Brazilian banking industry has recently been hit hard by “GhostDNS”, so named by China-based security research firm NetLab, which discovered the sinister malware in September. The phishing infection has hijacked over 100,000 routers in South America’s largest country

Question mark

By Richard Arneson To detail in a book the benefits that the digital age has delivered over the past twenty (20) would make Moby Dick look like a brochure. In a much, much smaller book would be a list of any negative ramifications, most of which would fall under the

Understanding Network security

By Richard Arneson Leave it Hollywood to allow the smallest attack surface in history to be breached. In the first Star Wars movie, the Death Star, which appeared to be only slightly smaller than Earth, had a tiny aperture that, if penetrated, would magically destroy the entire, menacing orb. Naturally,

cybersecurity image

By Richard Arneson You won’t find its definition in Merriam-Webster, The Oxford English Dictionary or at Dictionary.com. But if you’re in the IT industry, it’s a term you’ve either heard or will be hearing a lot about soon. Why? Because Tetration is what Cisco has named its robust analytics platform.

Security Check-up

Choose to ignore it and you’ll pay later (just ask the city of Atlanta) In March of this year, the City of Atlanta found out the hard way what failing to do a security check-up can mean. They were hit with the SamSam ransomware, which created an encrypted wall that

Protection for your own backyard

By Richard Arneson An 18-month-old study by the Ponemon Institute, an independent research and education organization that works to advance privacy management practices for businesses and government agencies, discovered that, even though malicious insiders compose the largest, most costly source of security breaches, over seventy-five percent (75%) of businesses largely