Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/18 Introducing the all-new Citrix Workspace Browser! Citrix Workspace Browser combines the native capabilities of a Chromium-based browser with Citrix Cloud services, providing a state-of-the-art user experience for all enterprise use cases. https://bit.ly/3jx022b #BeCyberSmart! How to Make the Most of Cybersecurity Awareness Month (Proofpoint) October is Cybersecurity Awareness Month—and it’s an ideal opportunity for your organization to provide safe computing reinforcement to yo... read more.

  • October 25, 2021

By Gotham, Posted in Infrastructure

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. SUMMARY  A manufacturing customer of Gotham’s has over 100 years of experience tailoring custom products to meet their customers’ most demanding specifications. They pride themselves on the ability to provide any size order, to any specification, in a wide variety of configurations, and shipped on-time, worldwide.  The customer work... read more.

  • October 22, 2021

By Gotham, Posted in Infrastructure

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. SUMMARY  A manufacturing customer of Gotham’s has over 100 years of experience tailoring custom products to meet their customers’ most demanding specifications. They pride themselves on the ability to provide any size order, to any specification, in a wide variety of configurations, and shipped on-time, worldwide.  The customer work... read more.

  • October 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/11 Introducing Citrix Secure Private Access Organizations need to rethink their approach to security, embracing zero trust, and at the same time make it seamless for employees to access apps securely from anywhere, at any time, and from any device. https://bit.ly/3oNuFUp The Business Benefit of Implementing an ITM Program (Proofpoint) Whether intentional or not, the risk of an insider threat incident is very real. Yet, the risk level is often minimized until it’s too late. And for most... read more.

  • October 15, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/4 Introducing the Industry’s First Self-Service, Storage-as-Code Platform (Pure Storage) Pure Fusion is an industry-first, self-service, autonomous storage-as-code platform that marries the best of enterprise storage with the agility and scalability of the cloud. https://bit.ly/3uEsaV5 CISA Kicks Off Cybersecurity Awareness Month CISA kicked off Cybersecurity Awareness Month today, following a proclamation by President Biden designating October as a time for the public and private secto... read more.

  • October 08, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/27 Google Issues Warning For 2 Billion Chrome Users Google published the news in a new blog post, where it revealed Chrome’s 11th ‘zero day’ exploit of the year has been found (CVE-2021-37973) and it affects Linux, macOS and Windows users. https://bit.ly/3AMEdSI Citrix Workspace SAML 2.0 support is now generally available With Citrix Workspace supporting SAML 2.0, you can seamlessly integrate users via Single Sign-On (SSO) with a broad range of identity and authentication pro... read more.

  • October 04, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/20 Don’t Let Cybersecurity Cracks Become Major Breaches (CyberArk) By maximizing your endpoint security posture with a layered security approach, your organization can reduce risk and uncertainty and protect your digital “house”. https://bit.ly/2XFZA9X How to Mitigate an Accidental Insider Threat (Proofpoint guest blog) Though malicious insider threats often get the most attention, they only comprise 14% of all insider threat incidents. Accidental insider threats, however, ac... read more.

  • September 24, 2021

By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/13 So your company just upgraded to Citrix Workspace. Now what? Citrix Workspace comes with a suite of tools to make your job easier — and your employees’ jobs. Now you can manage web and SaaS apps alongside the Windows apps you’ve been managing within Citrix Virtual Apps and Desktops. https://bit.ly/2XihZJC New Application Security Report Outlines the Biggest Challenges for DevSecOps (Fortinet) For business-critical workflows, organizations look to enable access from any dev... read more.

  • September 17, 2021