GDT Webinar Series – How to Fail at Security? Reserve Your Spot

enterprise-networking

Protection for your own backyard

By Richard Arneson An 18-month-old study by the Ponemon Institute, an independent research and education organization that works to advance privacy management practices for businesses and government agencies, discovered that, even though malicious insiders compose the largest, most costly source of security breaches, over seventy-five percent (75%) of businesses largely

A Fiber Optic First

By Richard Arneson It’s one of those “Do you remember where you were when…?” questions, at least for those at least fifty-years-old. And it didn’t just affect those in northern, hockey-friendly states. People as far south as Texas stopped their cars at the side of the road and began honking

asset lifecycle management

On April 24th, GDT Network Engineer Rabih Hamdani presented, as part of the GDT DevOps team’s weekly Lunch & Learn series, information about the MVC (Model, View, Controller) framework. There are many different approaches to organizing and delivering software and its expected functions. But the MVC framework has long been the dominant

Automation

GDT’s Agile Operations Developer Lead Brett Kugler presented, as part of GDT’s weekly Lunch & Learn series, a great, informative presentation on Automation. It’s a hot topic in IT today, and there are many ways teams can incorporate automation in their environment. Brett discusses various automation techniques, including orchestration, provisioning

Inspection Image

By Nic Hollins, GDT Network Security Engineer A draft for a new standard has been created by the Internet Engineering Task Force (IETF). It effectually allows people to avoid the scrutiny of surveillance equipment on their networks to perpetuate secure connections. Three Cisco employees have provided a working draft for

Wi-Fi Icon

by Moe Janmohammad via ScienceMoez A massive security flaw in the WPA2 encryption protocol has caused panic within the InfoSec community this week. How bad is it? If you own a device that uses WiFi, you’re affected. KRACK, a stylized way to write Key Reinstallation Attack, could allow an attacker