By Eric Corcoran, Posted in Technology Week in Review

Monday 1/11 F5 to Acquire Volterra to Create the First Edge 2.0 Platform for Enterprises and Service Providers Volterra enables a new Edge 2.0 open edge platform that will transform F5’s leadership position in enterprise application security and delivery, addressing the challenges inherent with first-generation edge solutions. Meet Challenges with an Agile Infrastructure (Pure Storage) With the expedited pace of operations, it’s critical to maintain the performance of... read more.

  • January 15, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/4 Combatting BEC and EAC: How Security Awareness Can Help You Tackle Business Email Compromise (Proofpoint) 86% of organizations reported experiencing business email compromise, with most organizations reporting multiple attacks. These attacks are getting more sophisticated each year—so how can you prepare your users for the potential attack that slips by perimeter defenses? 2020 – A Paradigm Shift for VDI and the Edge (IGEL) WFH dominated the end user computi... read more.

  • January 08, 2021

By Kaysel Adrover, Posted in

I like to create blog posts that easily and quickly help others with roadblocks that I’ve encountered while working on projects. I was not able to find a specific article that could show, step-by-step, how to publish a preconfigured Citrix Studio 7.x. Scenario: In a large company, you could have multiple Citrix Sites of different versions and spanning the globe. There are also different groups of administrators that would need access to manage the Citrix Sites. In this post, we will go through the... read more.

  • December 22, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/14 Citrix joins the Modern Computing Alliance We are excited to work with our fellow members of the Modern Computing Alliance to influence how the future of work gets done and reinforce our commitment to customer success with more integrated and innovative solutions across the silicon-to-cloud stack. Best-in-Class Storage for Modern Unstructured Data (Pure Storage) FlashBlade’s modern architecture has the innovation lead, with more to come. Companies need modern s... read more.

  • December 18, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/7 Fortinet SD-WAN: Now Extended to Rugged, Remote Locations Platform security vendor Fortinet has introduced two new ruggedized products to its FortiGate 60 next-generation firewall for SD-WAN series to bring security and Fortinet SD-WAN to harsh IT environments. 40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk? (Check Point) In research dubbed “Achilles,” the Check Point Research team has found over 400 vulne... read more.

  • December 11, 2020

By Michael Hawkins, Posted in Security

  Organizations continue to suffer significant financial losses and reputational damage as a result of ransomware attacks that invade their networks and encrypt valuable data. These attacks continue to occur for several reasons, including that organizations are simply ill prepared, they do not understand their security posture in the first place, or they fail to allocate sufficient funds for the needed protections. Compounding this is the scarcity of seasoned cybersecurity professionals. There simply... read more.

  • December 07, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/23 FireEye Announces Acquisition of Respond Software The acquisition of Respond Software enables Mandiant Solutions to further productize and scale its expertise and front-line intelligence as part of the Mandiant Advantage platform. Three Things to Know About Insider Threats in the Gig Economy (Proofpoint) Many companies don’t apply the same security principles to third parties as they do to internal employees. This increases exposure to organizations – par... read more.

  • December 04, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/16 Get Backup Data Out of Neutral to Accelerate Innovation (Pure Storage) If you’ve mostly thought of backups as a backup plan, it may be time to start thinking of these idle resources as an onward and upward plan—especially in terms of accelerating your modernization. Zero Trust: How to Secure Your Network in the Age of Cloud and Worker Mobility (Proofpoint) With people and computing resources scattered about, unknown devices connecting from near and far, a... read more.

  • November 20, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/2 Citrix Expands Digital Workspace Security Offerings The Citrix Ready Workspace Security Program provides a choice of leading security vendors that complement Citrix solutions, allowing people to securely work anytime, from anywhere, while simplifying how IT manages the environment. McAfee debuts remote browser isolation solution, XDR platform McAfee has launched a selection of new cybersecurity offerings including remote browser isolation tools to tackle attacks in... read more.

  • November 13, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/26 Combatting BEC and EAC: How Cloud App Security Can Protect Your Company from Email Account Compromise (EAC) (Proofpoint) Attackers often combine EAC with impersonation tactics (e.g. display name spoof, domain lookalikes) as a means to maintain the deceptive email discussion with the target. Microsoft Teams Phishing Attack Targets Office 365 Users The initial phishing email displays the name “There’s new activity in Teams,” making it appear like an a... read more.

  • October 30, 2020