Blog

By Timothy Karl, Posted in Infrastructure, Support

A common issue I see in Citrix Virtual Apps and Desktops deployments is users who are unable to print to their local printers from Mac and Linux clients when using Citrix Universal Printer Driver (UPD ). The good news is, it is a very simple fix! Citrix UPD relies on a series of printer drivers to be installed on the VDA machine. When a client printer is mapped into a session, it is automatically mapped to one of these three drivers: The Citrix Universal Printer and Citrix XPS Universal Printer drivers... read more.

  • September 06, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/26 Nvidia, VMware partner to offer virtualized GPUs The companies say it's the first hybrid cloud offering that lets enterprises use GPUs to accelerate AI, machine learning or deep learning workloads.  https://zd.net/2Hph6nm IRS Warns Taxpayers of New Scam Campaign Distributing Malware The emails contain a 'temporary password' or 'one-time password' to 'access' the files to submit the refund. But when taxpayers try to access these, it turns out to be a malicious file. http://bit.ly/2zqnC... read more.

  • August 30, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/19 Carbon Black Delivers New API Capabilities and Access Control on Its Cloud-Native Endpoint Protection Platform (EPP) Carbon Black’s latest innovation in the cloud gives security and IT teams granular control over the actions and data that individuals can access, providing administrators with greater control of data access and management within their security environments. http://bit.ly/2TLpums Citrix a Leader in Unified Endpoint Management Citrix today announced that it has been posit... read more.

  • August 23, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 McAfee buys container security startup NanoSec McAfee said NanoSec's security capabilities will be applied to applications and workloads deployed in containers and Kubernetes environments, giving customers app-level segmentation for detecting and preventing threats. https://zd.net/2MTqkfn AWS To Expand VMware Cloud On AWS Availability Amazon Web Services plans to expand the availability of VMware Cloud on AWS from 16 AWS regions to all 21 of its cloud computing regions by the end of next ye... read more.

  • August 16, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 7/30 Capital One Announces Data Security Incident This event affected approximately 100 million individuals in the United States and approximately 6 million in Canada. Importantly, no credit card account numbers or log-in credentials were compromised and over 99 percent of Social Security numbers were not compromised. https://prn.to/2GDVrrc Robinhood admits to storing some passwords in cleartext Not all Robinhood users were impacted, but a company spokesperson could not reveal the exact number.... read more.

  • August 09, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/22 Fake FaceApp Challenge Apps Are Installing Malware. Here's What You Need To Know The first detections of the FaceApp fake were a week ago but, according to data, there have been 500 unique users infected within the last 48 hours. http://bit.ly/2M4nDHu The rising tide of ransomware requires a commitment to best practices The long-term impact of this ransomware trend has to be a commitment to best practices. Let's start by not leaving the door unlocked. https://zd.net/2y11lOH Adware is the... read more.

  • July 26, 2019

By Nancy Rand, Posted in Security

The PCI DSS Council released overview and mapping documents to map PCI DSS requirements to the NIST Cybersecurity Framework. As stated in the mapping document: The mapping covers all NIST Framework functions and categories, with PCI DSS requirements directly mapping to 96 of the 108 subcategories. The mapping is based on PCI DSS v3.2.1 and the Cybersecurity Framework v1.1, using the 2018-04-16_framework_v.1.1_core spreadsheet1 The PCI DSS documents show how PCI DSS requirements can help when working... read more.

  • July 23, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Shopping On Amazon Prime Day? Keep An Eye Out For Phishing Scams Cybersecurity firm McAfee reported that a popular phishing kit, called 16Shop, has recently turned its attention to Amazon. While the kit has been designed to scam Apple customers, a modified version is now targeting Amazon shoppers just in time for one of the biggest shopping days of the year. http://bit.ly/2XNvmfi Citrix SD-WAN takes the fast path to the cloud Citrix SD-WAN 11.0 is coming soon with new features for... read more.

  • July 19, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 Splunk Secure Mobile Access for iOS Splunk has now released its Splunk Connected Experiences suite of mobile applications, leveraging the new Splunk Cloud Gateway application, to provide secure access to on-premises Splunk Enterprise with no separate VPN software required. Instead, the Cloud Gateway app on Splunk Enterprise communicates with the mobile apps through a secure, transparent, cloud-based service maintained by Splunk. http://bit.ly/2YG0iiF CrescentCore Mac Malware Outsmarts Apple:... read more.

  • July 12, 2019

By Brian Wagner, Posted in Infrastructure, Security, Storage

One of the most common attack vectors for cloud servers is through Remote Desktop Protocol (RDP) or Secure Shell (SSH). When administrators build servers in the cloud, Microsoft and AWS had typically assigned a public IP to ease management of the servers. There is no VMware Console equivalent in the cloud, so RDP or SSH are the only way to manage a server. The problem starts when that public IP is assigned. Hackers are constantly running scans on the IP ranges owned by the cloud providers, and as soon as a... read more.

  • July 10, 2019