Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 Proofpoint acquires insider threat intelligence firm ObserveIT in $225 million deal ObserveIT provides solutions for real-time enterprise network management, alerts when suspicious behavior is detected, and also assists firms in cybersecurity-related legal compliance. https://zd.net/2WDejO2 Coming Soon: New NetApp integrations Veeam Availability Orchestrator v2 brings brand new DR possibilities – including the ability to achieve real DR from backups – with extreme operational ef... read more.

  • November 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/28 Cisco Research Shows IT Eager to Adopt Artificial Intelligence, Intent-based Networking IT leaders expect new wireless technologies, IoT and AI-enabled operations, threat detection and remediation to have the biggest impact on their network strategy and design over the next five years. http://bit.ly/2qRrAXp PCI DSS Updates The PCI DSS Council recently announced that a new standard for commercial off the shelf (COTS) mobile devices, PCI Contactless Payments on COTS (CPoC™) mobile devi... read more.

  • November 01, 2019

By Nancy Rand, Posted in Security

The PCI DSS Council recently announced that a new standard for commercial off the shelf (COTS) mobile devices, PCI Contactless Payments on COTS (CPoC™) mobile devices, is to be released in December 2019. The current PCI DSS standard covers contactless payment methods, but the new publication provides detail on the mobile payment options. On October 28, the council is releasing an RFC on PCI DSS version 4.0 to assessors to provide feedback on the draft of the new version. New and revised requirements... read more.

  • October 28, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/21 Cloud Guidepost: Take control of user access with Citrix Cloud Access control helps prevent confidential information like customer data, personally identifiable information (PII), and intellectual property from falling into the wrong hands. It’s particularly important if your organization has a hybrid-cloud environment, where apps and data reside both on premises and in the cloud http://bit.ly/2qx5n0E How to Adopt a Threat Prevention Approach to Cybersecurity Organizations need to ad... read more.

  • October 25, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/14 Cloud Guidepost: The benefits of Citrix Access Control Citrix Access Control enables IT admins to publish and secure access to SaaS applications. There are additional security features that can be enforced without the complexity of creating a GPO or policy in Citrix Studio. http://bit.ly/2q5s7V8 Threat Extraction – A Preventive Method for Document-Based Malware Threat Extraction is unique because it doesn’t rely on detection like most security solutions. Instead, it facilitates... read more.

  • October 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 10/8 Citrix’s Chief Security Architect on how to avoid misconfiguration Misconfiguration risk can be efficiently managed by planning security before deployment, not as an afterthought. Planning ahead can greatly reduce misconfiguration risk at low cost and with moderate effort — a vital activity for such an important threat. http://bit.ly/2OvI8y2 McAfee To Debut New Partner Program Synced With Technology Vision The new training program will be tightly aligned with McAfee's corporate... read more.

  • October 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Most malspam contains a malicious URL these days, not file attachments If the majority of malspam content sent out these days leverages malicious links, this means operators are getting higher clickthroughs and infections when compared to the classic technique of attaching files to emails. https://zd.net/2mVWoVv IGEL’s new hardware design is on track for the EUC revolution The IGEL UD2 features a quad-core processor providing robust performance for use cases ranging from office applic... read more.

  • October 04, 2019

By Brian Wagner, Posted in Infrastructure, Virtualization

Microsoft has officially released their Desktop as a Service (DaaS) offering, dubbed Windows Virtual Desktop (WVD). There are some standout features of WVD, and as someone who’s been helping customers deliver Windows desktops and applications for 20 years, I feel a strong market momentum behind this offering. Microsoft is making WVD very attractive, starting with a unique multi-session version of Windows 10 which is only available in Azure through this offering and continuing with extended support for... read more.

  • October 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/23 Now Available – EC2 Instances (G4) with NVIDIA T4 Tensor Core GPUs The instances are equipped with up to four NVIDIA T4 Tensor Core GPUs, each with 320 Turing Tensor cores, 2,560 CUDA cores, and 16 GB of memory. The T4 GPUs are ideal for machine learning inferencing, computer vision, video processing, and real-time speech & natural language processing. https://amzn.to/2l12uCP Pure Storage Named as a Leader in New Gartner Magic Quadrant for Primary Storage Pure Storage is deliverin... read more.

  • September 27, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/16 F5 Networks: Application Lifecycle Focus Is Giving Partners A 'Bigger Piece Of The Pie’ Customers are constantly cycling through developing, deploying, operating and governing code, often across multiple cloud environments. It's a difficult process and the vast majority of customers doing it fast and at scale need help, said F5 Networks President and CEO François Locoh-Donou. http://bit.ly/2lST2l0 Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks... read more.

  • September 20, 2019