Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
blog.gdatasoftware.com
7
posts in the last 30 days
NIS-2
in Practice: How a Managed
SOC
Supports Compliance with Regulatory Requirements
blog.gdatasoftware.com
·
3d
Fake Document, Real Access:
Foxit
Impersonation Enables Stealth
VNC
Control
blog.gdatasoftware.com
·
3d
Claude
Mythos
:
Dangers
and rewards, right next to each other
blog.gdatasoftware.com
·
1w
Implementing
NIS-2
:
Obligations
, deadlines and practical tips
blog.gdatasoftware.com
·
1w
"Pics or it
didnt
happen" - What
BlueHammer
tells us about Vulnerability Disclosure
blog.gdatasoftware.com
·
1w
Security
Awareness
: Why employees are
essential
for IT security
blog.gdatasoftware.com
·
2w
Phishing
SMS
: How to Recognize
Fraudulent
Messages and Protect Yourself Effectively
blog.gdatasoftware.com
·
3w
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help