Archives

Security

Direction of Government IT: Securing an Increasingly Mobile Workforce

Both government and industry are moving away from the physical perimeter approach to security that limits usability and access. As users become more mobile, it is imperative for government agencies to provide secure digital workspaces that grant employees access to …


  

Related Stories

Continue reading..

Blueborne: Protect Endpoints from Bluetooth Vulnerabilities with XenMobile

On Sept. 12, Armis labs disclosed that they have identified 8 new vulnerabilities in Bluetooth potentially exposing any Bluetooth-enabled device including Android, Windows, Linux, iOS, and various IoT devices to attack. These attacks could range from remotely switching on cameras


  

Related Stories

Continue reading..

The Future of Work Hinges on Making Cybersecurity Everyone’s Business

Conversations about the future of work have to include security. I’ll take that one step further: the future of work very much revolves around the future of security. New ways of working offer exciting opportunities to boost employee productivity, creativity, …


  

Related Stories

Continue reading..

シトリックス、ガートナーのマジッククアドラントにおける2017年コンテンツ コラボレーション プラットフォームの分野で「リーダー」に位置づけられる


  

Related Stories

Continue reading..

Digital Vikings and the Internet of Ransomed Things

The saying “Prediction is very difficult, especially if it’s about the future” is an amusing Danish proverb. But predicting the future of the internet that uses sensitive and personal information as its fuel is less amusing. One dystopic prediction is …


  

Related Stories

Continue reading..

Delivering the Most Secure & Efficient Web Apps to Your Users

As a Master Citrix Certified Instructor (CCI), the conversation around security and monitoring inevitably comes up very early from students and is a core focus of mine around any conversation I have during my classes. Security is at the top …


  

Related Stories

Continue reading..

Child Care Court Gets Faster Results with Citrix ShareFile

When you deal with children’s welfare, confidentiality and information security are critically important. But, so are efficient workflows, document sharing and management — anything to help court hearings run as quickly and smoothly as possible, anything to minimize unnecessary distress


  

Related Stories

Continue reading..

Setor financeiro: como atender os requerimentos da SWIFT com a Citrix

Neste último ano, a cibersegurança ficou ainda mais no centro das atenções; claramente, essa é uma preocupação para todas as empresas, mas principalmente para os bancos. Dos ciberataques aos caixas eletrônicos até as cada vez mais sofisticadas técnicas de phishing …


  

Related Stories

Continue reading..

Sector Financiero: Cómo resolver con Citrix los requerimientos del CSP de SWIFT

En el último año la cyberseguridad se puso aún más en el centro de la escena; es claramente una preocupación para todas las empresas pero sobre todo para los bancos. Desde los hackeos a los cajeros automáticos, las cada vez …


  

Related Stories

Continue reading..

How the Cloud & Data Analytics Can Help Protect Against Ransomware Attacks

A report from the Ponemon Institute found that after a breach, companies experience a five percent drop in their average stock price the day a breach is announced, as well as a seven percent loss in customers, and another 31 …


  

Related Stories

Continue reading..

Go Que Newsroom

Categories