GDT Webinar Series – How to Fail at Security? Reserve Your Spot

information-technology-it

Software Investments
The unfortunate reality is that many businesses, armed with the best of intentions, spend millions on software designed to offer more efficiency, visibility, ROI, and more—only to have that software never be utilized to its full potential and gather dust on a shelf. Here’s what to know and what questions
covid cloud
While collaboration tools and online shopping and entertainment took center stage in the early days of coronavirus stay-at-home orders, the cloud worked behind the scenes to enable remote work and entertainment.
coronavirus cybersecurity challenges
As organizations divert resources to other parts of their business, they may be leaving their infrastructure exposed. Even though other concerns may seem more important right now, the truth is that protecting your company’s assets has never been more important. The risk to digital assets during a time of crisis
2020 IT trends
In January, we spoke about 6 trends to watch for in 2020, but for all of the predictions and hopes we had for the year, 2020 clearly had its own set of plans.
next-generation firewall
While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall also blocks threats such as advanced malware and application-layer attacks
cyber security - GDT
The need for adequate third-party security evaluations has become more important than ever.
video conferencing best practices
As many businesses begin to rely heavily on videoconferencing for the first time, it can be helpful to learn a few best practices from those who have helped businesses enable videoconferencing for years.
printer security
Did you know that people you don’t know could use your printer to harm others, and most likely, you would never know?
SIEM data
If your organization knows what its sensitive data elements are, where they reside – including all occurrences in consolidated log repositories – and understands the business use cases for accessing the SIEM data, the management of risk associated with that data is much more easily accomplished.