What’s new with Citrix Workspace — June 2021
We continue to make the employee experience better and more productive for workers and the IT management process more automated, seamless and intuitive for the IT teams that manage digital infrastructure. With each month that goes by, we find new ways to bring innovations to market to reach those goals.
QLC: Yes, It’s Real and People Want It (Pure Storage)
Not only are we eliminating the need for hybrid arrays with the much more sustainable all-QLC FlashArray//C, but we’re bringing significant power and space benefits over TLC. With QLC we deliver 2.7 times the density of Triple Layer Cell (TLC) —and that also means 2.7 times the power efficiency on a power/capacity basis.
Ransomware: Don’t be “That Employee” (Proofpoint)
Proofpoint’s EVP of Cybersecurity Strategy, Ryan Kalember, offers his insights about how a ransomware attack succeeds, whom it targets, why it’s so devastating, and what can be done about it
Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate (CrowdStrike)
Without structure, connecting the dots between security events can be a burdensome, manual process. To solve this problem, the CrowdStrike Falcon® platform combines people, process and technology working as one.
Survey Reveals 4 Ways Remote Work has Impacted IT Security And Here’s What You Can Do About It (Check Point)
The spike in cyber attacks, the added complexity of ensuring privacy for remote workers and the need to know what users are actually doing, even when they connect from their own devices.
Ransomware Giant REvil’s Sites Disappear
All of REvil’s Dark Web sites slipped offline as of early Tuesday morning, and it’s not clear whether it’s due to the ransomware gang getting busted or whether the threat actors did it on purpose.
Attackers Are After Privileged Users. Do You Know Who They Are? (CyberArk)
Since employees are conducting more and more of their personal lives online, it’s becoming even easier for attackers to gather the necessary information required to execute their social engineering campaigns.
Notorious Trickbot malware may have some new tricks up its sleeve
Cybersecurity researchers have detected a significant increase in the activity of the infamous Trickbot malware, with a large number of new command and control (C2) centers deployed around the world.
New StopRansomware.gov website – The U.S. Government’s One-Stop Location to Stop Ransomware
We encourage organizations to use this new website to understand the threat of ransomware, mitigate risk, and in the event of an attack, know what steps to take next.
Phishing continues to be one of the easiest paths for ransomware
Nearly 25% of all survey respondents said their ransomware attacks started through phishing, and of those victims, 65% had conducted anti-phishing training sessions. For enterprises with fewer than 500 employees, 41% said their attacks started with phishing.