Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/15 Press #1 to Play: A Look Into eCrime Menu-style Toolkits (Crowdstrike) The increasing availability of eCrime “syndication” models proliferating Ransomware as a Service (RaaS) programs grew in popularity as a threat vector and is one of the reasons behind the increasing volume of activity, allowing more novice threat actors to capitalize on the advanced skills of criminal malware developers and move from opportunistic breaches to targeted BGH ransomware campaigns. http://bit.ly/37g... read more.

  • February 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/1 Prisma Access Is the Leading Cloud Service to Secure Remote Users (Palo Alto Networks) We are excited that Prisma Access by Palo Alto Networks was the leading cloud-delivered security app by monthly active users, as well as by number of organizations. http://bit.ly/3tAQmH7 How a successful phishing attack can hurt your organization A successful phishing campaign can damage an organization in more ways than one. A report released Sunday by security provider Proofpoint looks at the impact of a... read more.

  • February 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 2/2 What’s new with Citrix Workspace – January 2021 We expect to see continued growth in secure, flexible work with a emphasis on maximizing employee experience against a growing number of work variables such as location, device type, device profile, line-of-business (LOB) technology requirements, and more. http://bit.ly/39FWUMN IoT Firmware Security: Zero-Day Exploitation & Prevention (Check Point) Understanding IoT firmware security will help protect against device attacks tha... read more.

  • February 05, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/25 Pure Storage Recognized as a Leader in Enterprise Flash Array Storage Category Pure is consistently recognized by its customers as this also marks the sixth consecutive year the company has maintained its market-leading NPS score in the top one-percent of Medallia-benchmarked B2B scores while scaling the business. http://prn.to/2YcfGER FireEye releases tool for auditing networks for techniques used by SolarWinds hackers Together with the report, FireEye researchers have also released a free... read more.

  • January 29, 2021

By Hank Smith, Posted in Infrastructure

That question came up recently for a customer when all of their vSphere hosts (8 in total) were pegged at 100% CPU. Customer Environment The environment consists of eight Nutanix nodes (servers) within a cluster running VMware vSphere 6.7 U3. The Nutanix clusters host core services (AD, SQL, File & Print, etc.) along with a Citrix Virtual Apps and Desktops 7.15 LTSR environment. Users access the environment via a pair of Citrix ADC VPX 200s. The user load is split between Virtual App sessions and Wind... read more.

  • January 25, 2021

By Nancy Rand, Posted in Security

The Cloud Security Alliance released their latest version of the Cloud Control Matrix (CCM) on 1/20/21. It is available from their website after answering a few questions. The mappings to Scope Applicability, Architectural Relevance, Corporate Governance Relevance, Cloud Service Delivery Model Applicability, Supplier Relationship, are not yet available, but the CSA has released the matrix to assist organizations to prepare to upgrade to version 4. https://cloudsecurityalliance.org/research/cloud-controls-m... read more.

  • January 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/18 Using Citrix ADM to speed up Citrix ADC pooled capacity configuration (Citrix) Configurations jobs can be created in Citrix ADM to automate the configuration of selected individual (or groups of) Citrix ADC instances. http://bit.ly/3bQv7uA Ransomware reveals the hidden weakness of our big tech world A group of tech companies including Microsoft, Citrix and FireEye are working on a three-month project to come up with options that they promise will "significantly mitigate" the ransomware thre... read more.

  • January 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/11 F5 to Acquire Volterra to Create the First Edge 2.0 Platform for Enterprises and Service Providers Volterra enables a new Edge 2.0 open edge platform that will transform F5’s leadership position in enterprise application security and delivery, addressing the challenges inherent with first-generation edge solutions. http://bit.ly/3ozVNDk Meet Challenges with an Agile Infrastructure (Pure Storage) With the expedited pace of operations, it’s critical to maintain the performance of... read more.

  • January 15, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/4 Combatting BEC and EAC: How Security Awareness Can Help You Tackle Business Email Compromise (Proofpoint) 86% of organizations reported experiencing business email compromise, with most organizations reporting multiple attacks. These attacks are getting more sophisticated each year—so how can you prepare your users for the potential attack that slips by perimeter defenses? http://bit.ly/358i57s 2020 – A Paradigm Shift for VDI and the Edge (IGEL) WFH dominated the end user computi... read more.

  • January 08, 2021

By Kaysel Adrover, Posted in

I like to create blog posts that easily and quickly help others with roadblocks that I’ve encountered while working on projects. I was not able to find a specific article that could show, step-by-step, how to publish a preconfigured Citrix Studio 7.x. Scenario: In a large company, you could have multiple Citrix Sites of different versions and spanning the globe. There are also different groups of administrators that would need access to manage the Citrix Sites. In this post, we will go through the... read more.

  • December 22, 2020