Archives

Martin Zugec

Learn About How U.S. Secret Service Tactics Can Up Your Organization’s Security Game

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Learn About How U.S. Secret Service Tactics Can Up Your Organization’s Security Game

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Citrix TIPs Series: Meltdown & Spectre Performance Impact and Mitigation Strategies

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

XenServer Plugins Collection v6

When I talk to developers, my favorite questions to ask them are “How are you using your own product?” or “Have you ever used it in a production environment?”

In my experience, if the answer is “yes,” the final software …


  

Related Stories

Continue reading..

How Women Formed the Computer Programming Industry

As a presenter, one of my favorite topics this year has been talking about the future of IT security. Where are we heading? What are the implications? What will IT security look like in the future?

If I could summarize …


  

Related Stories

Continue reading..

Meltdown and Spectre: Understanding the Performance Impact, Current State & What’s Next

Over the last couple of weeks, everyone in the IT industry has been keeping a close eye on a new class of security attacks that are taking advantage of a design flaw in modern computer processors. This is an industry-wide …


  

Related Stories

Continue reading..

On the Origin of Ransomware Species

It is not the strongest of the species that survives, nor the most intelligent, but the one that’s most responsive to change.

In the IT world, one of the best examples of perpetual change is security, especially the darker side …


  

Related Stories

Continue reading..

Password Wars: Randomizing Local Admin Passwords in Non-persistent Environments

The Phantom Menace

Achieving complete control over a company is a feat that requires a black belt and serious Jedi hacking skills. You must create a chain of multiple zero-day exploits to get into a network (we all know they


  

Related Stories

Continue reading..

Citrix Optimizer

What does it do?

I’ve always found the way operating systems evolve and adapt to be fascinating. They have more functionality with every release, their inner workings are more intelligent, they can automatically adapt to different situations, and are generally …


  

Related Stories

Continue reading..

Citrix Optimizer

What does it do?

I’ve always found the way operating systems evolve and adapt to be fascinating. They have more functionality with every release, their inner workings are more intelligent, they can automatically adapt to different situations, and are generally …


  

Related Stories

Continue reading..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 46 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1889