Blog

By Timothy Karl, Posted in

Historically, it has been complicated and challenging to manage VDI images across on-premises resource locations and across public clouds, with lots of different platforms, tools, and technologies involved. There are vendor specific components that are always changing and evolving. It is not a seamless experience. Citrix Image Portability Service for Citrix Virtual Apps and Desktops (CAVDS) helps solve this problem. It is a new Citrix Cloud service in tech preview that allows you to migrate images from on-... read more.

  • January 27, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/10 What’s new with Citrix Workspace At Citrix, we continue to modernize workflows in our portfolio of product solutions to ensure customers receive a great digital experience regardless of device, location, time, or network. https://bit.ly/3nbNS0k Check Point Research: Cyber Attacks Increased 50% Year over Year Check Point Research (CPR) today reports that from mid-2020 throughout 2021, there has been an upwards trend in the number of cyber-attacks. This trend reached an all-time high at... read more.

  • January 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/20 How to drive innovation and productivity for your distributed workforce (Citrix) Delivering a secure and productive hybrid-work experience that drives innovation everywhere is one reason Citrix created Citrix Workspace. To make it simpler than ever to support hybrid-work innovation and collaboration, Citrix Workspace empowers distributed workforces with a unified and streamlined work experience. https://bit.ly/3pcMEmZ Brute Force Attack: Definition, Types, and Prevention (Varonis) While th... read more.

  • January 07, 2022

By Michael Hawkins, Posted in Security

It is that time of the year when the festive spirit comes out of all of us and we spend additional time with our families and friends. At the same time though, hackers and criminals become more focused on finding ways to wreak havoc or extort ransom money from unprepared victims. It is for that reason that we are taking a quick look at three key security technologies that are a crucial part of any ransomware strategy. Data Loss Prevention (DLP) Data that is exfiltrated from an organization and falls into... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/13 EDR vs Enterprise Antivirus: What’s the Difference? (SentinelOne) For decades, organizations and businesses have invested in Antivirus suites in the hope of solving the challenges of enterprise security. But as the sophistication and prevalence of malware threats has grown over the last ten years, so the shortcomings of what is now referred to as “legacy” Antivirus have become all too apparent. https://bit.ly/3EUj8aQ Protect Yourself Against The Apache Log4j Vulnerability... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/6 Check Point CloudGuard Network Security streamlines operational efficiency with as-a-Service solution on AWS Check Point is honored and excited to take cloud security innovation to the next level through its integration with AWS Gateway Load Balancer and AWS Managed Gateway Endpoints. https://bit.ly/3EyKenR Password-stealing and keylogging malware is being spread through fake downloads Cybersecurity researchers disclose a newly discovered campaign that users custom malware to steal username... read more.

  • December 10, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/29 The top 10 FAQs from our Citrix Virtual Apps and Desktops webinar From on-premises environments to cloud and hybrid deployments, there is a ton to love about the latest updates. https://bit.ly/3p9aM8S Fortinet Announces New Service Offerings on AWS, Including Custom-Built Cloud Architectures Fortinet is pleased to announce new Cloud Consulting Service offerings in AWS Marketplace to help customers simplify and future-proof their application journeys on AWS and across hybrid and multi-cloud... read more.

  • December 03, 2021

By Nancy Rand, Posted in Security

In November, Troy Leach, Senior Vice President, Engagement Officer for the PCI Security Standards Council (PCI SSC), and Suzie Squier, President of the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC), discussed the protection of payment data during this holiday season.   https://blog.pcisecuritystandards.org/be-on-alert-this-holiday-season In October, the PCI SSC blog focused on their Work from Home Security Awareness Training, which is available from the council.... read more.

  • November 29, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/15 5 Key E-Commerce Holiday Shopping Cyberattacks to Secure, Defend, and Protect Against (F5) Over 1 million stolen credentials are reported every day, and underground markets have industrialised cyber crimes and fraudulent activities. Automation, malicious bots, and manual attacks expose users and businesses to fraud, which led to a 65% increase in successful fraud attempts from 2019 to 2020. https://bit.ly/3wMYw17 Tracking Upward and Innovating for our Customers—Together (Okta) Okta w... read more.

  • November 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/8 Reporting Phishing Simulations: The Essential Metric to Measure in Phishing Awareness (Proofpoint) Adding information about the reporting rate of simulations is a better way to understand user behavior change, than looking at the failure rate alone. The reporting rate demonstrates that users are “doing the good” and helping to secure the organization. https://bit.ly/3CWC5sC Client vs. Clientless Zero Trust Network Access (Fortinet) Zero-trust network access (ZTNA) is the next ev... read more.

  • November 12, 2021