IT Courses at GCA TRAINING_____________

Archive for author: Bob Giguere

ransomware

Key Takeaways:
Colonial Pipeline Attack

No one would have guessed that a typical ransomware attack would create a domino effect that ended in half of the United States going without gas. The Colonial Pipeline Attack was the wake-up call a lot of IT leaders nee...

Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming

ForgeRock OpenAM Vulnerability: What You Need to Know

On Monday, July 12, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) gave notice of a vulnerability with ForgeRock’s OpenAM. This popular Access Management platform is used as a front end for web applica...

Public Key Infrastructure & U2Fbg1

GCA I.D Lab #4 – Public Key Infrastructure & U2F

In this video, you will learn about encryption and public key infrastructure (PKI), including the difference between private keys and public keys. We’ll also cover U2F authentication and how it enforces data securi...

Risk-Based Authentication

GCA I.D Lab #3 – Risk-Based Authentication

During this video, we teach you how to reduce the amount of friction when logging in to your system by building a behavior profile in your database. Taking this measure can help you maximize security. Look...

Login Simplificationv3

GCA I.D Lab #2 – Login Simplification

This video will show you how to use MFA factors in a secure way by eliminating as many logins as possible. To do this, you will utilize single sign-on (SSO). Looking to learn more? Download our guide by cl...

Authenticationv3

GCA I.D Lab #1 – Authentication

In this video, we will cover multi-factor authentication (MFA) and its three factors. These different factors can be the make or break of data security. We will also cover methods that are flawed and leave your data at r...

Featured Image

Gartner Identity & Access Management Summit 2019 Takeaways

For the second year in a row, GCA attended Gartner’s Identity & Access Management Summit 2019 in Las Vegas, Nevada. We spent three days learning about new IAM strategies, sharing insights and meeting with leaders in ...

superhero businessman looking at city skyline at sunset. the concept of success, leadership and victory in business.

How to Adapt As A Leader Based On Who You Are Leading

Leadership vs. Management One of the biggest misconceptions that people in positions of power seem to believe is that by landing themselves a leadership position, they inherently have the necessary skillset to sufficient...

Zero Trust

Relationships Built On Zero Trust

Zero Trust vs. Too Much Trust In a Zero Trust Relationship, it’s not you, it’s me. Or more accurately – it’s not you, it’s the business necessity of keeping information and identities protected within an organizati...

IT Terminology

IT Terminology For The Busy Professional

Emerging Technologies Are Hard To Keep Up With By now, many of you have likely stumbled across the viral social media video of a child in a convenience store articulating the meaning of blockchain in simplistic terms to ...

Call Now ButtonTalk To Our CTO Now