Archives

Kurt Roemer

Google and Citrix: Securing Enterprise Workspaces From Chromebooks to Cloud

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Keep Your Dirty Internet Off My Clean Systems!

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Understanding Contextual Access — Login and Access Methods Can Make Sense

Are you frustrated every time you have to login or access new computing resources? Cumbersome credentials, onerous IT requirements, and the inability to leverage your own technologies can may help security, but at the expense of productivity — and that …


  

Related Stories

Continue reading..

The Future of Work Hinges on Making Cybersecurity Everyone’s Business

Conversations about the future of work have to include security. I’ll take that one step further: the future of work very much revolves around the future of security. New ways of working offer exciting opportunities to boost employee productivity, creativity, …


  

Related Stories

Continue reading..

Bring Your Own Tech to Work: Risks, Rewards & Realities for Healthcare

Organizations need to recognize that people will continue to use unauthorized technologies — often in direct violation of organizational policies. This is especially true in the healthcare industry, where the balance between patient care, HIPAA compliance, security issues and privacy


  

Related Stories

Continue reading..

Security Pivot: New Security Focal Points

This year’s Black Hat was one for the books — beginning with a call to action for all of us in the community to realign our thinking around security outcomes while spreading information security culture to more stakeholders. We’ve reached …


  

Related Stories

Continue reading..

A New Security Architecture for the Cloud Era

What does it mean for security when virtually every device in the enterprise connects to the cloud and people access apps and data on multiple devices and platforms? It’s one of the most urgent questions facing IT, and one reason


  

Related Stories

Continue reading..

Network Security – Winning the Battle, but Losing the War?

A cyber war is raging all around us, with increasingly capable warriors on both sides of the battlefront. On the attack are cybercriminals, malware, and all those who threaten both sensitive data and our digital lives.

Defending against threats and …


  

Related Stories

Continue reading..

GDPR Compliance: Redefining the Price of Privacy

Think compliance is an optional cost of doing business? Think again (or pay dearly).

The EU’s General Data Protection Regulations (GDPR) take effect May 25, 2018. If you’ve planned for GDPR, have a tested infrastructure in place and are not


  

Related Stories

Continue reading..


Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 580947 bytes) in /home/content/36/8658336/html/goquecom/wp-content/themes/WPGoqueV52/library/misc.php on line 25