GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Blogs

DCIM (Data Center Infrastructure Management)
DCIM combines the more glamorous IT with physical assets, the oft-ignored, but vitally important “offensive linemen of the data center.”
Security myths
According to the National Cyber Security Center, the cyber arm of Great Britain’s GCHQ, these are the two most common myths concerning network security.
Bleichenbacher attack
A new cryptographic attack allows attackers to intercept data believed to be secure through TLS. The researchers who identified it have dubbed it ROBOT, an acronym for Return of Bleichenbacher’s Oracle Threat.
State of the Union address
Technology was a focal point for one brief, shining moment during last night’s State of the Union address.
exploration
Apparently, the road to digital transformation is paved with fewer Fortune 1,000 logos than you’d think.
Insurance policy lapse
Many analysts believe the current cyber insurance market will double in the next 18 months, from $4 billion to $8 billion in premiums.
IoT Trends
Here a few of the ways IoT will become more ubiquitous in our day-to-day lives in 2019.
Exciting technology
Like a kid on Christmas morning, many organizations are so excited about implementing the latest and greatest technology that they're getting ahead of themselves.
Fiber optics
While not a household name, Richard Sturzebecher should be.