GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Blogs

Wi-Fi Technology
It’s about time Wi-Fi technology pulls its own weight. Isn’t it about time we ask Wi-Fi what else—other than connecting us to the world—it can do for us?
Technology arms race
On Monday, the DOJ held a press conference to announce that it is seeking criminal charges against Huawei, China’s mobile manufacturing giant.
Hyperconverged
The four key characteristics required to fully enjoy a hyperconverged infrastructure are Workloads, Storage, Manageability and Economics.
Multicloud Adoption Trends
Organizations are using multicloud strategies far more than they’re utilizing a hybrid cloud model.
Cyber attackers
An ambitious, but apparently unoriginal, cybercrime gang is taking responsibility for a rash of malware attacks that began just prior to the Christmas holidays. They’ve named it Phobos, ostensibly taken from the name given to the personification of fear in Greek mythology.
Warning cyber attack
Last week, the DHS issued an alert concerning repeated DNS hijacking attacks. Yesterday, it was significantly upgraded to an emergency directive due to a spate of recent DNS hijacking incidents that have originated in Iran.
5G benefits
A recent survey conducted by PCMag.com unveils that yes, indeed, the public definitely wants 5G, but they don’t really know why. That's called good marketing.
databreach
“Collection #1” is one of the largest security breaches of all time and includes 773 million unique email accounts and almost 25 million associated passwords.
Government Cloud Adoption
Gartner states fifty percent of all government organizations utilize cloud services.