Executive Order on Cybersecurity Addresses Zero Trust
In response to a growing number of serious cyber threats and incidents, President Biden has issued an Executive Order (EO) regarding improving the nation’s cybersecurity.
Citrix TIPs: Choosing the best path for your Citrix upgrade
Your Citrix upgrade doesn’t have to be a daunting experience, but it does require proper planning and change control to avoid disruption to your end users.
March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign (Check Point)
Check Point Research reports that IcedID has entered the global malware index for the first time, taking second place, after exploiting the Covid-19 pandemic to lure new victims.
Understanding the Differences Between DaaS and Traditional VDI (IGEL)
If VDI in the cloud is not necessarily DaaS, what actually is DaaS and what’s the difference between a VDI and a DaaS solution?
Compromised Cloud Accounts Cost Firms $6.2 Million Annually, New Ponemon Study Finds (Proofpoint)
According to new research from Ponemon Institute, companies lose $6.2 million annually from these often-preventable security incidents—or about 3.5% of their total revenues, on average.
Taking a Multi-Pronged Approach to Secure Telehealth Practices (Fortinet)
The real challenge the healthcare industry faces is that talking about telehealth security is easier than implementing it. Healthcare organizations must take proactive steps to put together the right technology, people, and processes to meet this demand. In other words, they need to make some behavioral changes.
A Peek Inside the Underground Ransomware Economy
At the center of the scene is the fact that ransomware operators often adopt affiliates, to whom they provide ransomware-as-a-service (RaaS) offerings. Affiliates can be seen as the channel partners of the underground, responsible for ransomware distribution to end victims.
Building a new, better, and more collaborative future of work post-pandemic (Citrix)
Building and maintaining a powerful new digital employee experience that fosters seamless collaboration, improved creativity, higher productivity, and better engagement is crucial to not just surviving but driving revitalization and growth.
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises (FireEye)
Although none of these incidents have appeared to significantly impact the physical world, their increasing frequency and relative severity calls for analysis on their possible risks and implications.
Gotham is pleased to announce that we’ve been named to CRN’s 2021 Solution Provider 500. The list ranks the top integrators, service providers, and IT consultants in North America by services revenue. Congratulations to all that made the list.
The Dawn Of The Four-Minute Cyberattack: Four Steps To Protect Your Company (Varonis)
Our collective security has become interdependent. Attack chains that were once only theoretical are now a reality.
Securing Your Data with Storage as a Service (Pure Storage)
But data security has been a concern for as-a-service models. Many perceive securing data in a storage-as-a-service model as less robust and more difficult to do than securing data on premises or in the public cloud. Let’s take a look. But which model is actually more secure: on-premises or as-a-service models?
Cyberattack Forces Meat Producer to Shut Down Operations in U.S., Australia
The world’s largest meat distributor shut down some operations in both the United States and Australia over the Memorial Day weekend after a cyberattack on its IT systems that could have a significant effect on the food supply chain if not resolved quickly.
FBI attributes JBS ransomware attack to REvil
"As the lead federal investigative agency fighting cyber threats, combating cybercrime is one of the FBI's highest priorities. We have attributed the JBS attack to REvil and Sodinokibi and are working diligently to bring the threat actors to justice," the agency said.
Transform Your Data Center and Network Security to Support Distributed Cloud Apps and Remote Workers at the Edge (Check Point)
The new hybrid data center architecture leverages the cloud to enable secure applications to be delivered at the network edge to support remote workers with better response times, lower costs and faster time to market.
How to simplify the Citrix Virtual Apps and Desktops control plane
Defining your infrastructure layer is one of the key steps when building a workspace that enable your users to securely work from anywhere.
Job-themed email threats remain a preferred theme for threat actors (Proofpoint)
According to the FBI, unemployment fraud – including online campaigns – cost people more than $59 million in 2020. These types of campaigns use various methods to lure victims into clicking on malicious links, downloading attachments, or sending personal data to the threat actors.