Archives

Security & Compliance

Cryptojacking – How to Avoid This Digital Parasite

How cryptojacking came to be, what to watch out for, and how Citrix can help you avoid it like the plague!

Cryptojacking targets both endpoints and servers - both on-premises and in the cloud. The goal is the same: enslave …


  

Related Stories

Continue reading..

Citrix Research Reveals Savvy UK Businesses are Spreading the Risk of Their Cryptocurrency Investments

Despite the meteoric rise of Bitcoin last year — and its continuing reign as the world’s largest cryptocurrency by market cap — a new study commissioned by Citrix makes the discovery that of the 50% of large British businesses that


  

Related Stories

Continue reading..

Citrix Research Reveals Savvy UK Businesses are Spreading the Risk of Their Cryptocurrency Investments

Despite the meteoric rise of Bitcoin last year — and its continuing reign as the world’s largest cryptocurrency by market cap — a new study commissioned by Citrix makes the discovery that of the 50% of large British businesses that


  

Related Stories

Continue reading..

Webinar with NSS Labs: Protect Your Apps and Data with Citrix Web Application Firewall

Cybersecurity is all about managing and reducing your business risk — not only the overall risk of damage to your brand, but also the risks associated with losing customers, revenue, and experiencing decreased employee productivity due to unresponsive applications.

Are …


  

Related Stories

Continue reading..

Webinar with NSS Labs: Protect Your Apps and Data with Citrix Web Application Firewall

Cybersecurity is all about managing and reducing your business risk — not only the overall risk of damage to your brand, but also the risks associated with losing customers, revenue, and experiencing decreased employee productivity due to unresponsive applications.

Are …


  

Related Stories

Continue reading..

Meltdown and Spectre: Understanding the Performance Impact, Current State & What’s Next

Over the last couple of weeks, everyone in the IT industry has been keeping a close eye on a new class of security attacks that are taking advantage of a design flaw in modern computer processors. This is an industry-wide …


  

Related Stories

Continue reading..

On the Origin of Ransomware Species

It is not the strongest of the species that survives, nor the most intelligent, but the one that’s most responsive to change.

In the IT world, one of the best examples of perpetual change is security, especially the darker side …


  

Related Stories

Continue reading..

Ransomware – Another Storm is Coming

Listen, and understand! That Terminator is out there! It can’t be bargained with. It can’t be reasoned with. It doesn’t feel pity, or remorse, or fear. And it absolutely will not stop… ever!”

Time-travelling killer cyborgs. As far as …


  

Related Stories

Continue reading..

Save the Date! International Data Privacy Day, Sunday, Jan. 28

International Data Privacy Day takes place this Sunday, January 28. We at Citrix take special note of the event this year, given the approaching effective date of the EU’s General Data Protection Regulation, our customers’ need for secure computing environments


  

Related Stories

Continue reading..

Getting a Head Start on the GDPR – 10 Key Considerations

Preparing for the implementation of the GDPR is a significant undertaking. The proper frame of mind to do so is to think of implementing the GDPR as a marathon rather than a sprint. A successful implementation of the GDPR will


  

Related Stories

Continue reading..

Go Que Newsroom

Categories