Welcome to Our Blog

In-depth security analysis, news, and advice

Jan 25

2017

Dell and Great Bay Software Partner to Deliver Secure IoT Solutions

  We are proud to announce that Great Bay Software has recently joined the Dell IoT Solutions Partner Program as an Associate Partner. Here is what you need to know: A technology revolution is...

Jan 24

2017

The Paradigm is Shifting – from Network Access Control to Endpoint Security

The Internet of Things (IoT) is driving innovation and remarkable new applications across many industries. We see huge business and consumer benefits ranging from improved healthcare to manufacturing...

Jan 17

2017

How IoT is Fueling the Next Industrial Revolution for Manufacturing

IoT Will Fuel the Next Industrial Revolution Manufacturing is poised for the next industrial revolution. Smart factories and automated processes give new hope to manufacturers that have spent...

Jan 10

2017

5 Security Predictions for 2017: What Will be Your Greatest Risk?

Welcome to the New Year. From all of us at Great Bay Software, we wish you a safe and secure 2017. With recent news filled with stories of hacking by government actors, the prevention of cyberattacks...

Jan 03

2017

A ‘Must Read’ - Gartner on IoT Security

Gartner recently published their Market Guide for IoT Security, in which they recommend strategies and solutions that include those of Great Bay Software. Here’s a quick ‘take-away’ on their research...

Dec 27

2016

7 Best Practices to Secure Enterprise IoT

Connected devices and the broader Internet of Things (IoT) ecosystem promise to deliver new efficiencies for industrial processes, environmental controls, fleet management, package delivery—and much,...

Dec 20

2016

What is Enterprise IoT Security?

  Scoping Out Enterprise IoT Security Cyber-attackers are turning their attention to the Internet of Things (IoT). In October 2016, the Mirai botnet was used to launch a DDoS attack against the DNS...

Dec 15

2016

IT Dieting 101: Stop Stretching Your Technology

The deployment of network security typically grows organically in enterprise organizations. This requires IT to be able to support and integrate a wide range of solutions, technologies and vendors....

Nov 29

2016

How to Protect Your Financial Institution from DDoS Attacks

Previously we discussed the reality and risks of DDoS attacks via IoT endpoints. Financial institutions, in particular, are high profile targets. I’m sure you’ve seen headlines about the five top...

Nov 17

2016

3 Reasons Why Medical Device Security is Your Top Risk

Hospitals have become the mother lode for cybercriminals. The convergence of valuable data, network backdoors and the vast array of unprotected biomedical devices has created a perfect storm. Here...

Subscribe to Blog Updates