Welcome to Our Blog

In-depth security analysis, news, and advice

Jan 31


IoT Powers New Efficiencies in the Energy Sector

The smart grid and connected devices are creating exciting new business opportunities and delivery models for energy and utility companies. Smart meters are making a big impact around the world as...

Jan 25


Dell and Great Bay Software Partner to Deliver Secure IoT Solutions

  We are proud to announce that Great Bay Software has recently joined the Dell IoT Solutions Partner Program as an Associate Partner. Here is what you need to know: A technology revolution is...

Jan 24


The Paradigm is Shifting – from Network Access Control to Endpoint Security

The Internet of Things (IoT) is driving innovation and remarkable new applications across many industries. We see huge business and consumer benefits ranging from improved healthcare to manufacturing...

Jan 17


How IoT is Fueling the Next Industrial Revolution for Manufacturing

IoT Will Fuel the Next Industrial Revolution Manufacturing is poised for the next industrial revolution. Smart factories and automated processes give new hope to manufacturers that have spent...

Jan 10


5 Security Predictions for 2017: What Will be Your Greatest Risk?

Welcome to the New Year. From all of us at Great Bay Software, we wish you a safe and secure 2017. With recent news filled with stories of hacking by government actors, the prevention of cyberattacks...

Dec 27


7 Best Practices to Secure Enterprise IoT

Connected devices and the broader Internet of Things (IoT) ecosystem promise to deliver new efficiencies for industrial processes, environmental controls, fleet management, package delivery—and much,...

Dec 20


What is Enterprise IoT Security?

  Scoping Out Enterprise IoT Security Cyber-attackers are turning their attention to the Internet of Things (IoT). In October 2016, the Mirai botnet was used to launch a DDoS attack against the DNS...

Dec 15


IT Dieting 101: Stop Stretching Your Technology

The deployment of network security typically grows organically in enterprise organizations. This requires IT to be able to support and integrate a wide range of solutions, technologies and vendors....

Nov 29


How to Protect Your Financial Institution from DDoS Attacks

Previously we discussed the reality and risks of DDoS attacks via IoT endpoints. Financial institutions, in particular, are high profile targets. I’m sure you’ve seen headlines about the five top...

Nov 17


3 Reasons Why Medical Device Security is Your Top Risk

Hospitals have become the mother lode for cybercriminals. The convergence of valuable data, network backdoors and the vast array of unprotected biomedical devices has created a perfect storm. Here...

Subscribe to Blog Updates