GDT Webinar Series – How to Fail at Security? Reserve Your Spot

cyber-security

Biometric data
Though incredibly easy to operate, the use of biometric data comes with substantial risk. If your biometric data is compromised, it can never again be used as an identifying feature. Passwords can be changed, but your fingerprints cannot.
Future-Proof Your Encrypted Traffic Through Analytics
Due to the nature of certificate technology and the increasing security requirements of modern web browsers, this often creates a large workload for internal IT teams to deploy comprehensive Public Key Infrastructure technologies. Failure to properly implement them often results in poor user experience, broken web pages, and frustrated customers.
Ransomware attacks
On October 28, 2020 the Cybersecurity and Infrastructure Security Agency (CISA) issued alert AA20-302A as a joint alert from CISA, the FBI, and the Department of Health and Human Services (HHS) regarding ransomware activity targeting the healthcare and public heath sectors in the United States.
Client data security
Every business needs to take security seriously. Staying compliant with regulations is NOT a one-time or point-in-time status; it is an everyday commitment.
Security Shield
Now that the EU Court of Justice has nullified the EU-U.S. Privacy Shield Act, attainment of GDPR compliance may be a US company’s best route to ensuring uninterrupted data flow.
TikTok Social Media App
In a year of filled with concerns such as a global pandemic, murder hornets, and so much more, the crisis du jour for Americans is now…TikTok?
coronavirus cybersecurity challenges
As organizations divert resources to other parts of their business, they may be leaving their infrastructure exposed. Even though other concerns may seem more important right now, the truth is that protecting your company’s assets has never been more important. The risk to digital assets during a time of crisis
next-generation firewall
While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall also blocks threats such as advanced malware and application-layer attacks
cyber security - GDT
The need for adequate third-party security evaluations has become more important than ever.