Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/18 Citrix named a Leader in Unified Endpoint Management Citrix has been named a Leader in The Forrester Wave™: Unified Endpoint Management, Q4 2019 report. Over the past couple of years, we have specifically focused on improving employee experience by working directly with customers to develop a deep understanding of the challenges employees face. http://bit.ly/2CUvxgK The Future of Load Balancing Rests on Data Those requests are not always equal in terms of execution because data. That... read more.

  • November 22, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/11 Proofpoint Q3 2019 Threat Report — Emotet’s return, RATs reign supreme, and more 15% of malicious payloads were remote access Trojans and 45% were banking Trojans, up from 6% and 23% in Q2 2019, respectively. http://bit.ly/2rqZ5js US Govt Asks Users to Be Wary of Holiday Scams and Malware "As this holiday season approaches, the Cybersecurity and Infrastructure Security Agency (CISA) encourages users to be aware of potential holiday scams and malicious cyber campaigns, particula... read more.

  • November 15, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 Proofpoint acquires insider threat intelligence firm ObserveIT in $225 million deal ObserveIT provides solutions for real-time enterprise network management, alerts when suspicious behavior is detected, and also assists firms in cybersecurity-related legal compliance. https://zd.net/2WDejO2 Coming Soon: New NetApp integrations Veeam Availability Orchestrator v2 brings brand new DR possibilities – including the ability to achieve real DR from backups – with extreme operational ef... read more.

  • November 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/28 Cisco Research Shows IT Eager to Adopt Artificial Intelligence, Intent-based Networking IT leaders expect new wireless technologies, IoT and AI-enabled operations, threat detection and remediation to have the biggest impact on their network strategy and design over the next five years. http://bit.ly/2qRrAXp PCI DSS Updates The PCI DSS Council recently announced that a new standard for commercial off the shelf (COTS) mobile devices, PCI Contactless Payments on COTS (CPoC™) mobile devi... read more.

  • November 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/21 Cloud Guidepost: Take control of user access with Citrix Cloud Access control helps prevent confidential information like customer data, personally identifiable information (PII), and intellectual property from falling into the wrong hands. It’s particularly important if your organization has a hybrid-cloud environment, where apps and data reside both on premises and in the cloud http://bit.ly/2qx5n0E How to Adopt a Threat Prevention Approach to Cybersecurity Organizations need to ad... read more.

  • October 25, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/14 Cloud Guidepost: The benefits of Citrix Access Control Citrix Access Control enables IT admins to publish and secure access to SaaS applications. There are additional security features that can be enforced without the complexity of creating a GPO or policy in Citrix Studio. http://bit.ly/2q5s7V8 Threat Extraction – A Preventive Method for Document-Based Malware Threat Extraction is unique because it doesn’t rely on detection like most security solutions. Instead, it facilitates... read more.

  • October 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 10/8 Citrix’s Chief Security Architect on how to avoid misconfiguration Misconfiguration risk can be efficiently managed by planning security before deployment, not as an afterthought. Planning ahead can greatly reduce misconfiguration risk at low cost and with moderate effort — a vital activity for such an important threat. http://bit.ly/2OvI8y2 McAfee To Debut New Partner Program Synced With Technology Vision The new training program will be tightly aligned with McAfee's corporate... read more.

  • October 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Most malspam contains a malicious URL these days, not file attachments If the majority of malspam content sent out these days leverages malicious links, this means operators are getting higher clickthroughs and infections when compared to the classic technique of attaching files to emails. https://zd.net/2mVWoVv IGEL’s new hardware design is on track for the EUC revolution The IGEL UD2 features a quad-core processor providing robust performance for use cases ranging from office applic... read more.

  • October 04, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/23 Now Available – EC2 Instances (G4) with NVIDIA T4 Tensor Core GPUs The instances are equipped with up to four NVIDIA T4 Tensor Core GPUs, each with 320 Turing Tensor cores, 2,560 CUDA cores, and 16 GB of memory. The T4 GPUs are ideal for machine learning inferencing, computer vision, video processing, and real-time speech & natural language processing. https://amzn.to/2l12uCP Pure Storage Named as a Leader in New Gartner Magic Quadrant for Primary Storage Pure Storage is deliverin... read more.

  • September 27, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/16 F5 Networks: Application Lifecycle Focus Is Giving Partners A 'Bigger Piece Of The Pie’ Customers are constantly cycling through developing, deploying, operating and governing code, often across multiple cloud environments. It's a difficult process and the vast majority of customers doing it fast and at scale need help, said F5 Networks President and CEO François Locoh-Donou. http://bit.ly/2lST2l0 Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks... read more.

  • September 20, 2019