Security & Compliance

Guidance for reducing unauthenticated OGNL injection security vulnerability risk (CVE-2022-26134)

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent OGNL injection vulnerability in multiple versions of Atlassian Confluence (CVE-2022-26134). You can download these and apply them immediately.…

The post Guidance for reducing unauthenticated OGNL injection security vulnerability risk (CVE-2022-26134) first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Introducing Citrix Adaptive Authentication

The way people work has changed over the last two years, and even as we see more people returning to the office, remote, hybrid, and mobile workstyles are here to stay. This diversity has created a complex landscape of devices …

The post Introducing Citrix Adaptive Authentication first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Guidance for reducing HTTP protocol RCE security vulnerability risk with Citrix Web App Firewall (CVE-2022-21907)

The HTTP protocol stack remote code execution vulnerability (CVE-2022-21907) lies in the management of HTTP Trailers by the kernel mode driver http.sys. Certain operating systems such as Windows Server 2019 and Windows 10 version 1809 are, by default, not vulnerable …

The post Guidance for reducing HTTP protocol RCE security vulnerability risk with Citrix Web App Firewall (CVE-2022-21907) first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Help to secure your critical apps against potential state-sponsored cyberattacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations that they should be prepared to defend against nation state-sponsored cyberattacks. “Every organization — large and small — must be prepared to respond to disruptive cyber activity,” the agency

The post Help to secure your critical apps against potential state-sponsored cyberattacks first appeared on Citrix Blogs.

Continue reading..

How Citrix Analytics can help you protect your employees and your organization

The massive shift to remote work and adoption of new technologies to support distributed workforces during the COVID-19 pandemic expanded the attack surface, creating challenges for organizations that were trying to enable access to essential resources and to keep employees …

The post How Citrix Analytics can help you protect your employees and your organization first appeared on Citrix Blogs.

Continue reading..

Take control of IT security for your organization

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

The post Take control of IT security for your organization first appeared on Citrix Blogs.

Continue reading..

Could internal apps be your biggest security risk?

Protecting your internal apps — those managed by your internal IT team, such as ERP or HR apps — is critical and just as important as protecting your public-facing apps. Today, bad actors can do just as much, if not …

The post Could internal apps be your biggest security risk? first appeared on Citrix Blogs.

Continue reading..

Preview: Adaptive access based on network location for Citrix Workspace

Organizations need employees to be productive, no matter where they’re working from or what device they’re working on. At the same time, they need to ensure secure access to corporate resources and that potential threats are managed to protect the …

The post Preview: Adaptive access based on network location for Citrix Workspace first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Preview: Adaptive access based on network location for Citrix Workspace

Organizations need employees to be productive, no matter where they’re working from or what device they’re working on. At the same time, they need to ensure secure access to corporate resources and that potential threats are managed to protect the …

The post Preview: Adaptive access based on network location for Citrix Workspace first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

How to protect yourself against keyloggers

Conversations about the future of work were propelled forward during the pandemic. The rapid shift to remote work and the necessity to expand bring-your-own-device (BYOD) programs encouraged business leaders to fully embrace innovative business models. This trend is expected to …

The post How to protect yourself against keyloggers first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Go Que Newsroom

Categories