Google and Citrix: Securing Enterprise Workspaces From Chromebooks to Cloud
We’ve Moved! Update your Reader Now.
This feed has moved to: http://feeds.feedblitz.com/citrix
Update your reader now with this changed subscription address to get your latest updates from us.
Keep Your Dirty Internet Off My Clean Systems!
We’ve Moved! Update your Reader Now.
This feed has moved to: http://feeds.feedblitz.com/citrix
Update your reader now with this changed subscription address to get your latest updates from us.
Understanding Contextual Access — Login and Access Methods Can Make Sense
Are you frustrated every time you have to login or access new computing resources? Cumbersome credentials, onerous IT requirements, and the inability to leverage your own technologies can may help security, but at the expense of productivity — and that …
Related Stories
The Future of Work Hinges on Making Cybersecurity Everyone’s Business
Conversations about the future of work have to include security. I’ll take that one step further: the future of work very much revolves around the future of security. New ways of working offer exciting opportunities to boost employee productivity, creativity, …
Related Stories
Bring Your Own Tech to Work: Risks, Rewards & Realities for Healthcare
Organizations need to recognize that people will continue to use unauthorized technologies — often in direct violation of organizational policies. This is especially true in the healthcare industry, where the balance between patient care, HIPAA compliance, security issues and privacy
Related Stories
Security Pivot: New Security Focal Points
This year’s Black Hat was one for the books — beginning with a call to action for all of us in the community to realign our thinking around security outcomes while spreading information security culture to more stakeholders. We’ve reached …
Related Stories
A New Security Architecture for the Cloud Era
What does it mean for security when virtually every device in the enterprise connects to the cloud and people access apps and data on multiple devices and platforms? It’s one of the most urgent questions facing IT, and one reason …
Related Stories
Network Security – Winning the Battle, but Losing the War?
A cyber war is raging all around us, with increasingly capable warriors on both sides of the battlefront. On the attack are cybercriminals, malware, and all those who threaten both sensitive data and our digital lives.
Defending against threats and …
Related Stories
GDPR Compliance: Redefining the Price of Privacy
Think compliance is an optional cost of doing business? Think again (or pay dearly).
The EU’s General Data Protection Regulations (GDPR) take effect May 25, 2018. If you’ve planned for GDPR, have a tested infrastructure in place and are not
Related Stories
- Top Glove’s Billionaire Founder Buys Stake in Education Firm April 13, 2021
- GOP Undercuts Vote-Security Push by Going Light on the Security April 13, 2021
- Spy Chiefs to Warn of Threats From SolarWinds to North Korea April 13, 2021
- Biden Picks Christine Wormuth as First Female Army Secretary April 12, 2021
- Biden Picks Christine Wormuth as First Female Army Secretary April 12, 2021