Blog

By Nancy Rand, Posted in Security

The PCI DSS Council released overview and mapping documents to map PCI DSS requirements to the NIST Cybersecurity Framework. As stated in the mapping document: The mapping covers all NIST Framework functions and categories, with PCI DSS requirements directly mapping to 96 of the 108 subcategories. The mapping is based on PCI DSS v3.2.1 and the Cybersecurity Framework v1.1, using the 2018-04-16_framework_v.1.1_core spreadsheet1 The PCI DSS documents show how PCI DSS requirements can help when working... read more.

  • July 23, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Shopping On Amazon Prime Day? Keep An Eye Out For Phishing Scams Cybersecurity firm McAfee reported that a popular phishing kit, called 16Shop, has recently turned its attention to Amazon. While the kit has been designed to scam Apple customers, a modified version is now targeting Amazon shoppers just in time for one of the biggest shopping days of the year. http://bit.ly/2XNvmfi Citrix SD-WAN takes the fast path to the cloud Citrix SD-WAN 11.0 is coming soon with new features for... read more.

  • July 19, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 Splunk Secure Mobile Access for iOS Splunk has now released its Splunk Connected Experiences suite of mobile applications, leveraging the new Splunk Cloud Gateway application, to provide secure access to on-premises Splunk Enterprise with no separate VPN software required. Instead, the Cloud Gateway app on Splunk Enterprise communicates with the mobile apps through a secure, transparent, cloud-based service maintained by Splunk. http://bit.ly/2YG0iiF CrescentCore Mac Malware Outsmarts Apple:... read more.

  • July 12, 2019

By Brian Wagner, Posted in Infrastructure, Security, Storage

One of the most common attack vectors for cloud servers is through Remote Desktop Protocol (RDP) or Secure Shell (SSH). When administrators build servers in the cloud, Microsoft and AWS had typically assigned a public IP to ease management of the servers. There is no VMware Console equivalent in the cloud, so RDP or SSH are the only way to manage a server. The problem starts when that public IP is assigned. Hackers are constantly running scans on the IP ranges owned by the cloud providers, and as soon as a... read more.

  • July 10, 2019

By Tom Stanley, Posted in Infrastructure

Splunk is shining its light on Dark Data and enabling companies to extract real business value from their machine data. As the value of that newly exposed information increases, it is important to be able to access it from anywhere, even from mobile devices. Although a Splunk mobile app has been available for a few years, connecting to an on-premises Splunk Enterprise deployment was difficult. The mobile device needed some type of VPN software to access Splunk dashboards, or there were more complicated meth... read more.

  • July 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/24 Getting Started with Citrix Workspace and On-Premises Virtual Apps and Desktops For those customers that still have on-premises Virtual Apps and Desktop deployments, implementing the Workspace service offers an excellent opportunity to evaluate the user experience of Citrix Cloud and Workspace app. Customers can keep their on-premises NetScaler and StoreFront deployments, and still integrate their Virtual Apps and Desktops sites into Workspace. http://bit.ly/2N98iaO Hackers Are Targeting 1.5... read more.

  • June 28, 2019

By Timothy Karl, Posted in Infrastructure, Virtualization

As of August 2018, the Citrix Workspace app has replaced Citrix Receiver. The Citrix Workspace app securely aggregates all of your applications and data, whether on-premises or in the cloud, from any device into a single unified app. Below is a sample screenshot of the Workspace app: In order to take full advantage of the Workspace app, it needs to be integrated with the Workspace service which is a fundamental component of Citrix Cloud. The service is responsible for aggregating and delivering all of yo... read more.

  • June 21, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/17 This data-stealing malware has returned with new attacks and nasty upgraded features The new version of Scranos comes with an updated infection technique based around a fake application called CClear. It's based on the legitimate and widely used system optimisation application CCLeaner and is advertised as carrying out similar functionalities.  https://zd.net/2ZjaIVs AMCA data breach has now gone over the 20 million mark Exposed data included names, home addresses, phone numbers, dates... read more.

  • June 21, 2019

By Ken Phelan, Posted in Infrastructure

Subscription-based pricing is all the rage and I think there are some gaps regarding expectations all around. Let’s start with the math and we’ll end on philosophy. Traditionally, you might buy a piece of software for say, $100K. You would generally pay about 20% a year in maintenance, $20K. If you were amortizing this expense over five years this would be like a $40K a year budget impact ($20K amortization plus $20K maintenance). Easy enough, if the subscription price of this software is less... read more.

  • June 20, 2019

By Hank Smith, Posted in Virtualization

In a paradoxical way, giving workers more applications to aid in productivity has made them less productive. Inundated by too many apps with too many features, workers are stuck switching between various full-scale enterprise applications to get their day to day tasks accomplished. Citrix is attempting to bring productivity back with the new, intelligent Citrix Workspace. Citrix Workspace has existed as a cloud-only product for over a year, providing access to virtual apps, virtual desktops, and files. Ci... read more.

  • June 19, 2019