By Timothy Karl, Posted in Infrastructure, Virtualization

As of August 2018, the Citrix Workspace app has replaced Citrix Receiver. The Citrix Workspace app securely aggregates all of your applications and data, whether on-premises or in the cloud, from any device into a single unified app. Below is a sample screenshot of the Workspace app: In order to take full advantage of the Workspace app, it needs to be integrated with the Workspace service which is a fundamental component of Citrix Cloud. The service is responsible for aggregating and delivering all of yo... read more.

  • June 21, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/17 This data-stealing malware has returned with new attacks and nasty upgraded features The new version of Scranos comes with an updated infection technique based around a fake application called CClear. It's based on the legitimate and widely used system optimisation application CCLeaner and is advertised as carrying out similar functionalities. AMCA data breach has now gone over the 20 million mark Exposed data included names, home addresses, phone numbers, dates... read more.

  • June 21, 2019

By Ken Phelan, Posted in Infrastructure

Subscription-based pricing is all the rage and I think there are some gaps regarding expectations all around. Let’s start with the math and we’ll end on philosophy. Traditionally, you might buy a piece of software for say, $100K. You would generally pay about 20% a year in maintenance, $20K. If you were amortizing this expense over five years this would be like a $40K a year budget impact ($20K amortization plus $20K maintenance). Easy enough, if the subscription price of this software is less... read more.

  • June 20, 2019

By Hank Smith, Posted in Virtualization

In a paradoxical way, giving workers more applications to aid in productivity has made them less productive. Inundated by too many apps with too many features, workers are stuck switching between various full-scale enterprise applications to get their day to day tasks accomplished. Citrix is attempting to bring productivity back with the new, intelligent Citrix Workspace. Citrix Workspace has existed as a cloud-only product for over a year, providing access to virtual apps, virtual desktops, and files. Ci... read more.

  • June 19, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/10 Enterprise under attack: Dark web cyber criminals sell hacking tools aimed at business In many cases, attackers are specifically advertising their products as a means of compromising enterprises. For example, researchers found listings for Nuke malware being advertised in this way – a particularly worrying example because of how destructive it can be. Interns and Social Media: A Goldmine for Hackers Through my experiences, I’ve learned the best spots to se... read more.

  • June 14, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 6/4 CRN®, a brand of The Channel Company has named Gotham Technology Group to their 2019 Solution Provider 500 list at spot #181. This annual list ranks the largest North American IT channel partner organizations by revenue. The Solution Provider 500 is the industry standard for recognizing the highest performing technology integrators, strategic service providers and IT consultants. Quest Diagnostics says 11.9 million patients affected by data breach According to the... read more.

  • June 07, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 5/28 In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc Since that leak, rogue actors have used EternalBlue to spread malware that has paralyzed hospitals, airports, rail and shipping operators, A.T.M.s and factories that produce critical vaccines. Now the tool is hitting the United States where it is most vulnerable, in local governments with aging digital infrastructure and fewer resources to defend themselves. Title insurer exposes millions of mortgage records... read more.

  • May 31, 2019

By Nancy Rand, Posted in Security

Q2 2019 NIST Privacy Framework Additional Documentation The NIST Privacy Framework group has published new documents to complement the Privacy Framework Draft document. The NIST Privacy Framework Discussion Draft Core (Excel) spreadsheet facilitates an organization’s consideration of the elements of the framework. The Comparison of Privacy Framework and Cybersecurity Framework Cores (PDF) presents a side-by-side view of each framework’s corresponding elements for review. Each document furthe... read more.

  • May 30, 2019

By Hank Smith, Posted in Infrastructure

Many companies are moving a variety of workloads to the cloud. This blog covers the tools available for managing Elastic Cloud Compute (EC2) instance costs in AWS. The goal is to understand what is available and other technologies that are available to control EC2 costs. EC2 is the function that allows customers to create various instances of virtual machines within AWS. Why move workloads to the cloud (AWS in this case)? There are a variety of reasons why companies are choosing to move to the cloud incl... read more.

  • May 30, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 5/21 Millions of Instagram influencers and brands had their private contact data scraped and exposed From a brief review of the data, each record contained public data scraped from Instagram accounts, including their bio, profile picture, the number of followers they have, if they’re verified and their location by city and country, but also contained private contact information, such as the Instagram account owner’s email address and phone number. Citrix Usher... read more.

  • May 24, 2019