Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 McAfee buys container security startup NanoSec McAfee said NanoSec's security capabilities will be applied to applications and workloads deployed in containers and Kubernetes environments, giving customers app-level segmentation for detecting and preventing threats. https://zd.net/2MTqkfn AWS To Expand VMware Cloud On AWS Availability Amazon Web Services plans to expand the availability of VMware Cloud on AWS from 16 AWS regions to all 21 of its cloud computing regions by the end of next ye... read more.

  • August 16, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 7/30 Capital One Announces Data Security Incident This event affected approximately 100 million individuals in the United States and approximately 6 million in Canada. Importantly, no credit card account numbers or log-in credentials were compromised and over 99 percent of Social Security numbers were not compromised. https://prn.to/2GDVrrc Robinhood admits to storing some passwords in cleartext Not all Robinhood users were impacted, but a company spokesperson could not reveal the exact number.... read more.

  • August 09, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/22 Fake FaceApp Challenge Apps Are Installing Malware. Here's What You Need To Know The first detections of the FaceApp fake were a week ago but, according to data, there have been 500 unique users infected within the last 48 hours. http://bit.ly/2M4nDHu The rising tide of ransomware requires a commitment to best practices The long-term impact of this ransomware trend has to be a commitment to best practices. Let's start by not leaving the door unlocked. https://zd.net/2y11lOH Adware is the... read more.

  • July 26, 2019

By Nancy Rand, Posted in Security

The PCI DSS Council released overview and mapping documents to map PCI DSS requirements to the NIST Cybersecurity Framework. As stated in the mapping document: The mapping covers all NIST Framework functions and categories, with PCI DSS requirements directly mapping to 96 of the 108 subcategories. The mapping is based on PCI DSS v3.2.1 and the Cybersecurity Framework v1.1, using the 2018-04-16_framework_v.1.1_core spreadsheet1 The PCI DSS documents show how PCI DSS requirements can help when working... read more.

  • July 23, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Shopping On Amazon Prime Day? Keep An Eye Out For Phishing Scams Cybersecurity firm McAfee reported that a popular phishing kit, called 16Shop, has recently turned its attention to Amazon. While the kit has been designed to scam Apple customers, a modified version is now targeting Amazon shoppers just in time for one of the biggest shopping days of the year. http://bit.ly/2XNvmfi Citrix SD-WAN takes the fast path to the cloud Citrix SD-WAN 11.0 is coming soon with new features for... read more.

  • July 19, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 Splunk Secure Mobile Access for iOS Splunk has now released its Splunk Connected Experiences suite of mobile applications, leveraging the new Splunk Cloud Gateway application, to provide secure access to on-premises Splunk Enterprise with no separate VPN software required. Instead, the Cloud Gateway app on Splunk Enterprise communicates with the mobile apps through a secure, transparent, cloud-based service maintained by Splunk. http://bit.ly/2YG0iiF CrescentCore Mac Malware Outsmarts Apple:... read more.

  • July 12, 2019

By Brian Wagner, Posted in Infrastructure, Security, Storage

One of the most common attack vectors for cloud servers is through Remote Desktop Protocol (RDP) or Secure Shell (SSH). When administrators build servers in the cloud, Microsoft and AWS had typically assigned a public IP to ease management of the servers. There is no VMware Console equivalent in the cloud, so RDP or SSH are the only way to manage a server. The problem starts when that public IP is assigned. Hackers are constantly running scans on the IP ranges owned by the cloud providers, and as soon as a... read more.

  • July 10, 2019

By Tom Stanley, Posted in Infrastructure

Splunk is shining its light on Dark Data and enabling companies to extract real business value from their machine data. As the value of that newly exposed information increases, it is important to be able to access it from anywhere, even from mobile devices. Although a Splunk mobile app has been available for a few years, connecting to an on-premises Splunk Enterprise deployment was difficult. The mobile device needed some type of VPN software to access Splunk dashboards, or there were more complicated meth... read more.

  • July 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/24 Getting Started with Citrix Workspace and On-Premises Virtual Apps and Desktops For those customers that still have on-premises Virtual Apps and Desktop deployments, implementing the Workspace service offers an excellent opportunity to evaluate the user experience of Citrix Cloud and Workspace app. Customers can keep their on-premises NetScaler and StoreFront deployments, and still integrate their Virtual Apps and Desktops sites into Workspace. http://bit.ly/2N98iaO Hackers Are Targeting 1.5... read more.

  • June 28, 2019

By Timothy Karl, Posted in Infrastructure, Virtualization

As of August 2018, the Citrix Workspace app has replaced Citrix Receiver. The Citrix Workspace app securely aggregates all of your applications and data, whether on-premises or in the cloud, from any device into a single unified app. Below is a sample screenshot of the Workspace app: In order to take full advantage of the Workspace app, it needs to be integrated with the Workspace service which is a fundamental component of Citrix Cloud. The service is responsible for aggregating and delivering all of yo... read more.

  • June 21, 2019