Florin Lazurca

Cryptojacking – How to Avoid This Digital Parasite

How cryptojacking came to be, what to watch out for, and how Citrix can help you avoid it like the plague!

Cryptojacking targets both endpoints and servers - both on-premises and in the cloud. The goal is the same: enslave …


  

Related Stories

Continue reading..

Ransomware – Another Storm is Coming

Listen, and understand! That Terminator is out there! It can’t be bargained with. It can’t be reasoned with. It doesn’t feel pity, or remorse, or fear. And it absolutely will not stop… ever!”

Time-travelling killer cyborgs. As far as …


  

Related Stories

Continue reading..

Pass the Bitcoins and Gravy, Please

Last week, at Thanksgiving dinners across the US, there were heated debates - about politics, the economy, and my favorite topic - Bitcoin! Is it a pyramid scheme? Is it a Ponzi? Is it a Bubble? Well - I don’t …


  

Related Stories

Continue reading..

Digital Vikings and the Internet of Ransomed Things

The saying “Prediction is very difficult, especially if it’s about the future” is an amusing Danish proverb. But predicting the future of the internet that uses sensitive and personal information as its fuel is less amusing. One dystopic prediction is …


  

Related Stories

Continue reading..

Quick & Easy SWIFT Guidelines to Meet the Compliance Deadline!

October is National Cyber Security Awareness Month in the U.S. — it’s a time to share information, guidance, and tools to improve privacy, safety, and security in the digital age. In that spirit, I want to follow up on a


  

Related Stories

Continue reading..

Mission Impossible: Trusting Disparate Endpoints 

Which endpoints do you trust?

Like it or not, today’s enterprise security landscape is heavily endpoint and user-dependent. The actions and inactions of users, coupled with unmanaged networks and questionable device states combines to make endpoint security a frustration of …


  

Related Stories

Continue reading..

The Usual Suspects – The Security Pitfalls of Data At Large

citrix_data_security

Data is the crown jewel of an organization - its high value must be protected at all costs. Data fuels the modern-day economy; the work of the present and the work of the future demand that we share it more


  

Related Stories

Continue reading..

Ransomware Hits Every 40 Seconds — Is Your Company Ready?

The ransomware threat continues to grow.

According to Kaspersky, in 2016 a company was hit by a ransomware attack every 40 seconds—a threefold increase over the previous year. Fueled in part by the emergence of ransomware as a service


  

Related Stories

Continue reading..

Securing High-value Apps in Financial Services IT

This blog discusses how IT in banks and financial services organizations are leveraging their Citrix investment to secure high-value apps and data, in particular SWIFT systems. It is an overview of my Synergy breakout session that outlines these principles and


  

Related Stories

Continue reading..

Security—It’s Not Just an IT Problem. It’s a Business Problem.

Over the past few years, multiple studies have shown that information security risk is one of the top two or three concerns of every organization’s board of directors. CSOs are spending more time in front of their boards educating them …


  

Related Stories

Continue reading..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 46 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1995