Security & Compliance

Engineer a secure future in Industry 4.0

Today’s manufacturer isn’t short of challenges. Supply chain disruptions and labor shortages are just some of the obstacles it must address. Another is the ever-increasing risk of a cyberattack. In this blog post, we look at what makes the industry …

The post Engineer a secure future in Industry 4.0 first appeared on Citrix Blogs.

Continue reading..

How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent authentication bypass vulnerability in multiple versions of Atlassian Confluence app (versions prior to 2.7.38 and 3.0.5). The vulnerability (…

The post How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability first appeared on Citrix Blogs.

Continue reading..

How to implement zero trust security for your network

Read full post . . . or http://www.go-que.com/how-to-implement-zero-trust-security-for-your-network

“Never trust, always verify” and “just enough” access.

These are the key philosophies behind zero trust approaches to cybersecurity. Although the name zero trust speaks for itself, cybersecurity architectures based on zero trust approaches ensure that your data, and infrastructure …

The post How to implement zero trust security for your network first appeared on Citrix Blogs.

Continue reading..

Zero trust architecture benefits for your business

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

The post Zero trust architecture benefits for your business first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Citrix Features Explained: Improving end-user security with Citrix Secure Private Access

The biggest threat to your organization is coming from inside. From careless mistakes to lost devices to malicious insiders, a striking 82 percent of data breaches come from what the 2022 Verizon DBIR calls “the human element.” This suggests the …

The post Citrix Features Explained: Improving end-user security with Citrix Secure Private Access first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Seven principles of the zero trust security model

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

The post Seven principles of the zero trust security model first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Why should you evolve your multi-factor authentication to adaptive authentication?

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

The post Why should you evolve your multi-factor authentication to adaptive authentication? first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Get ready for MFA across all Citrix properties

Citrix enables companies around the world to do their best work, flexibly and securely, whether their assets are hosted on premises, or across hybrid cloud and multi-cloud environments. In early 2020, we took a key step toward enhancing the security …

The post Get ready for MFA across all Citrix properties first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Introducing Citrix support for Google Cloud Identity and non-domain joined workloads

With VDI and DaaS technologies becoming the go-to solution to support secure hybrid work, organizations have more deployment options than ever before, allowing customer choice in service providers and configurations at nearly every step of the way. With Google Cloud …

The post Introducing Citrix support for Google Cloud Identity and non-domain joined workloads first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Citrix research highlights common threats across industry verticals

Unlike network firewalls, which operate at layer 3 and layer 4 of the network stack, web application firewalls sit in front of the apps and operate at the app layer (L7). Their job is to monitor HTTP/S traffic to identify …

The post Citrix research highlights common threats across industry verticals first appeared on Citrix Blogs.


  

Related Stories

Continue reading..

Go Que Newsroom

Categories