GDT Webinar Series – How to Fail at Security? Reserve Your Spot

cyber-security

newspapers
GDT Security Analysts GDT SOC GDT Security Operations Center
NETFLIX Fake Email
The FTC wants you to know that if you have a Netflix account, you better watch out. They’re not talking about Santa. No, they’ve issued a phishing alert.
3D face recognition background
Facial recognition has come a long way since the 1960's, when a man named Woodrow Wilson Bledsoe took measurements between key, primary facial elements, laid those coordinates out on grid-lined tablet, and, ultimately, could replicate subjects’ faces.
cybercriminals malware fraud Icon
It may not attract the attention of Hollywood like jewel heists or the mob, but neither can hold a candle to cybercrime―at least financially.
Blockchain Technology Image
Blockchain is now addressing the age-old question that has haunted hiring managers for years—are job candidates being truthful?
Q & A for a Q & A

By Richard Arneson Think back to the first time you hopped on the Internet. If you’re under the age of thirty-years-old, it might have been a “meh” moment, if it even registered at all. It was probably lost among the other technological advancements that surrounded your crib. But if you’re

By Richard Arneson Apparently, scammers get bored, too, at least the ones who find it fun and profitable to generate hustles related to cryptocurrency. They’ve found a new target—Facebook. Their scamming medium of choice has primarily been Twitter, which has for months been littered with fake cryptocurrency advertisements. For Facebook,

cryptocurrency

By Richard Arneson It’s been over three (3) years since Google announced that developers could no longer publish applications on Google Play willy-nilly—that is, without their apps having first been vetted. But that vetting process is largely handled like it is on Apple’s App store—manually. Yes, people are their main

FTC's findings

By Richard Arneson By now, most of us are aware that cyber threats don’t discriminate. Any business, regardless of size, industry, location, et al., is a potential target. The media, of course, is going to focus on breaches that affect huge, public-facing, high-profile corporations whose names are recognizable (Target, Uber,