Wait One Damn Moment, Please
Systems implementations are a delicate balancing act, requiring immense time and planning. So throwing in a new app during a routine deployment without doing your due diligence may make things much more difficult in the long run.
A practical approach for managing risk (Citrix)
Considering the impact that a cyber-security event can have, companies need to have in place a proper risk management framework that aligns with changing business priorities that impact technology decisions.
Spearphishing Campaign Exploits COVID-19 To Spread Lokibot Infostealer
Researchers have discovered threat actors once again capitalizing on the COVID-19 pandemic and current attention on the World Health Organization (WHO) with a new spearphishing email designed to spread the LokiBot trojan sent using the WHO trademark as a lure.
NVIDIA is contributing its AI smarts to help fight COVID-19
NVIDIA has joined the COVID-19 High Performance Computing Consortium group tackling the disease; that group plans to support researchers by giving them time with 30 supercomputers offering a combined 400 petaflops of performance. The GPU maker will add to this by providing expertise in AI, biology and large-scale computing optimizations.
Nutanix Recognized as a Gartner Peer Insights Customers’ Choice Vendor for Hyperconverged Infrastructure for the Second Year in a Row
Nutanix has been named as a 2020 Gartner Peer Insights Customers’ Choice for Hyperconverged Infrastructure. This is the second year that Nutanix has been recognized as a Customers’ Choice.
Finding balance and remaining productive during COVID-19 (Citrix)
The focus of technology leaders is shifting from simply maintaining business continuity to scaling workforce efficiency coupled with a great remote work experience.
Live Webinar – Emerging Cyber Threats while Working From Home
Join our panelists Ken Phelan and Bert Amodol from Gotham Technology Group, and Steve Stasiukonis from Secure Network as they discuss precautions you can take to keep your organization safe from remote work threats.
Dark_nexus botnet outstrips other malware with new, potent features
Dark_nexus uses a rather unique approach to maintain a foothold on a machine -- a form of 'risk assessment' conducted on existing processes. A list of whitelisted processes is included in the malware's code, together with their process identifiers, which dictates the processes that are considered okay.
Tackling the Cybersecurity Challenges of Our “New Normal” (CyberArk)
As IT teams work around the clock to execute business continuity plans, cyber attackers have been working just as hard and fast to exploit weaknesses in these dynamic and changing environments.
This is why the vicious xHelper malware resists factory wipes and reboots
First spotted in March 2019 and once deemed unkillable -- but still considered very dangerous -- the mobile malware has been traced back to the download and installation of apps outside of the official Android app repository, the Google Play Store, and often disguises itself as a cleaner or speed utility.
Discussing Security With Remote Workers (FireEye)
It’s important at this time for business leadership and security management to be doing what they can to help all of the people who aren’t used to working from home better protect themselves and, by extension, protect the business. How can IT/IS staff help them out?
Working From Home Network Security Considerations
Some aspects of working from home have similarities to mobile remote staff. But there are distinct differences that need to be taken into account due to the elevated risks that working from home networks present.
Login VSI Releases Login Enterprise 4.1
Login Enterprise Version 4.1 ensures business continuity and scale. Login Enterprise now supports all testing use cases in one product. The new version integrates application compatibility testing, load testing, as well as performance and availability testing into a single platform.