By Eric Corcoran, Posted in Technology Week in Review

Monday 1/31 CISA Releases Incident And Vulnerability Response Playbooks To Strengthen Cybersecurity For Federal Civilian Agencies “The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, Deputy Executive Assistant Director for Cybersecurity. Hybrid work is here to stay, and that’s a good t... read more.

  • February 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/17 Threat Update 71 – Security Predictions for 2022 (Varonis) 2021 was a challenging year for security professionals – the attacks and vulnerabilities seemed bigger and occurred more frequently. DHL Replaces Microsoft as Most Imitated Brand in Phishing Attempts in Q4 2021 (Check Point) In Q4, global logistics and distribution company DHL ended Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal cr... read more.

  • January 28, 2022

By Timothy Karl, Posted in

Historically, it has been complicated and challenging to manage VDI images across on-premises resource locations and across public clouds, with lots of different platforms, tools, and technologies involved. There are vendor specific components that are always changing and evolving. It is not a seamless experience. Citrix Image Portability Service for Citrix Virtual Apps and Desktops (CAVDS) helps solve this problem. It is a new Citrix Cloud service in tech preview that allows you to migrate images from on-... read more.

  • January 27, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/10 What’s new with Citrix Workspace At Citrix, we continue to modernize workflows in our portfolio of product solutions to ensure customers receive a great digital experience regardless of device, location, time, or network. Check Point Research: Cyber Attacks Increased 50% Year over Year Check Point Research (CPR) today reports that from mid-2020 throughout 2021, there has been an upwards trend in the number of cyber-attacks. This trend reached an all-time high at... read more.

  • January 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/20 How to drive innovation and productivity for your distributed workforce (Citrix) Delivering a secure and productive hybrid-work experience that drives innovation everywhere is one reason Citrix created Citrix Workspace. To make it simpler than ever to support hybrid-work innovation and collaboration, Citrix Workspace empowers distributed workforces with a unified and streamlined work experience. Brute Force Attack: Definition, Types, and Prevention (Varonis) While th... read more.

  • January 07, 2022

By Michael Hawkins, Posted in Security

It is that time of the year when the festive spirit comes out of all of us and we spend additional time with our families and friends. At the same time though, hackers and criminals become more focused on finding ways to wreak havoc or extort ransom money from unprepared victims. It is for that reason that we are taking a quick look at three key security technologies that are a crucial part of any ransomware strategy. Data Loss Prevention (DLP) Data that is exfiltrated from an organization and falls into... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/13 EDR vs Enterprise Antivirus: What’s the Difference? (SentinelOne) For decades, organizations and businesses have invested in Antivirus suites in the hope of solving the challenges of enterprise security. But as the sophistication and prevalence of malware threats has grown over the last ten years, so the shortcomings of what is now referred to as “legacy” Antivirus have become all too apparent. Protect Yourself Against The Apache Log4j Vulnerability... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/6 Check Point CloudGuard Network Security streamlines operational efficiency with as-a-Service solution on AWS Check Point is honored and excited to take cloud security innovation to the next level through its integration with AWS Gateway Load Balancer and AWS Managed Gateway Endpoints. Password-stealing and keylogging malware is being spread through fake downloads Cybersecurity researchers disclose a newly discovered campaign that users custom malware to steal username... read more.

  • December 10, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/29 The top 10 FAQs from our Citrix Virtual Apps and Desktops webinar From on-premises environments to cloud and hybrid deployments, there is a ton to love about the latest updates. Fortinet Announces New Service Offerings on AWS, Including Custom-Built Cloud Architectures Fortinet is pleased to announce new Cloud Consulting Service offerings in AWS Marketplace to help customers simplify and future-proof their application journeys on AWS and across hybrid and multi-cloud... read more.

  • December 03, 2021

By Nancy Rand, Posted in Security

In November, Troy Leach, Senior Vice President, Engagement Officer for the PCI Security Standards Council (PCI SSC), and Suzie Squier, President of the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC), discussed the protection of payment data during this holiday season. In October, the PCI SSC blog focused on their Work from Home Security Awareness Training, which is available from the council.... read more.

  • November 29, 2021