Blog

By Timothy Karl, Posted in Infrastructure, Virtualization

Citrix Cloud DaaS has introduced significant upgrades to its backup and restore capabilities, ensuring that businesses can maintain continuity and resilience effortlessly. Here’s a look at what’s new and how these features can benefit your organization. Scheduled and On-Demand Backups: The updated backup feature allows administrators to schedule backups according to their specific needs. This can be set up to occur at regular intervals, ensuring that all critical data is securely backed up wi... read more.

  • January 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Ensuring that only trusted software can run on your systems is like casting a powerful spell to ward off dark forces. CIS Safeguard 2.5, "Allowlist Authorized Software," is akin to the protective enchantments used at Hogwarts School of Witchcraft and Wizardry to keep out dark magic. The Sorting Hat of Software Think of the allowlist as the Sorting Hat at Hogwarts. Just as the hat sorts students into houses... read more.

  • January 21, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/13 Understanding Indicators of Compromise and Their Role in Cybersecurity (Arctic Wolf) Indicators of Compromise continue to evolve and change as they are directly related to the constantly evolving nature of threats: malware strains appear and disappear, the expanding attack surface reveals new targets for exploit, and threat actors continue to shift their signatures in attempts to avoid detection. https://arcticwolf.com/resources/blog/understanding-indicators-of-compromise-and-their-role-in-cy... read more.

  • January 17, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Keeping an accurate and up-to-date inventory of software is essential. CIS Safeguard 2.4, "Utilize Automated Software Inventory Tools," ensures that this task is handled with the precision and efficiency reminiscent of Tony Stark's (a.k.a. Iron Man) technological prowess from the Marvel Universe. Stark's Inventory Management Imagine Tony Stark, surrounded by his multitude of Iron Man suits and high-tech ga... read more.

  • January 14, 2025

By Eric Corcoran, Posted in Technology Week in Review

Thursday 1/2 How SASE Addresses Enterprise Network Challenges (Check Point) Organizations implementing SASE have reported improved operational efficiency, with streamlined management and reduced complexity leading to better resource allocation and faster response times to security incidents. https://blog.checkpoint.com/harmony-sase/how-sase-addresses-enterprise-network-challenges/ Citrix Secure Private Access delivers ZTNA in hybrid mode (Citrix) Implementing ZTNA organization-wide is not a trivial und... read more.

  • January 10, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Keeping tabs on every device connected to your network is crucial for maintaining security and functionality. CIS Safeguard 1.4, "Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory," helps achieve this with the meticulous accuracy of Hermione Granger from the Harry Potter series. The Hermione of Networks Much like Hermione Granger, known for her encyclopedic knowled... read more.

  • January 07, 2025

By Kamran Ahmad, Posted in Infrastructure, Support, Virtualization

Recently, I was upgrading a customer's StoreFront deployment from version 1912 to version 2402 LTSR CU1 on a Windows Server 2019. During the process, I encountered an issue where I could not uninstall StoreFront on the second server in the StoreFront server group. The following error message was displayed: I tried the steps in this Citrix article, which had a similar error message, but that did not work. After some digging, I realized Citrix services were still present. I followed the steps below to r... read more.

  • January 03, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/16 8 Trends Reshaping Network Security in 2025 (Palo Alto Networks) The future of network security is an exciting one, but it also comes with its challenges. As 2025 approaches, it’s critical for organizations to stay ahead of these emerging trends by building agile security strategies that are adaptable to the rapidly changing threat landscape. https://www.paloaltonetworks.com/blog/2024/12/8-trends-network-security-in-2025/ How integrated, intelligent identity security makes you more pr... read more.

  • December 20, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the world of cybersecurity, staying ahead of threats requires more than just vigilance; it demands a keen eye for detail and an ability to uncover hidden assets. This is where CIS Safeguard 1.3, "Utilize an Active Discovery Tool," comes into play, much like the legendary detective Sherlock Holmes. The Case of the Missing Assets Imagine Sherlock Holmes, with his magnifying glass in hand, meticulously sca... read more.

  • December 17, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/9 Windows 365 Link: A New Era for Thin Client Computing Unveiled at Ignite 2024 Microsoft unveiled the Windows 365 Link at its Ignite conference on November 19, 2024. This compact, fanless device is designed to provide seamless access to Windows 365 Cloud PCs, building upon the legacy of Windows CE, Microsoft's early thin client operating system. https://www.gothamtg.com/blog/windows-365-link-a-new-era-for-thin-client-computing-unveiled-at-ignite-2024 How to Overcome MFA Challenges for Stronge... read more.

  • December 13, 2024