Security

Displaying 20 of 408 posts

Securing the XenApp/XenDesktop XML Service – Important Steps to Prevent Theft of User Passwords

Hi, this is Andy Cooper from Citrix product security team. I’m starting the first in a series of blog posts…

Automated Security Scanners: What You Need to Know (Part 3)

In the third of this series of articles, we’re taking a look at how you can use a packet trace…

Scale Out the Performance of Network Security Devices without Compromise

One day, not long ago, a customer asked if NetScaler could help them with load balancing transparent network security devices…

Context-Aware Security with XenApp and XenDesktop

Remember how things were back in 2006? Ahhhh, those were the good old days, when security was simple – proper…

Hardhats vs. Cyber-Hacks: A Snapshot of UK Local Authority Staff Training Habits

Hardhats vs. Cyber-Hacks: a snapshot of UK local authority staff training habits  With cyber-security threats an ever-growing issue for public…

Three Key Security Trends EXPOsed: Wrapping Up IP EXPO Europe

Another year, another IP EXPO Europe over. With over 300 seminars, 15,000 visitors and keynotes from some of the world’s…

How ShareFile Addresses Data Security Using the Data Breach Triangle

You don’t have to be a security guru to understand the challenges faced by security professionals to help provide a…

October is National Cyber Security Awareness Month—Are You Up for the Challenge?

October may be National Cyber Security Month, but for today’s IT professionals, security doesn’t need a special month to raise…

It Ain’t Over ‘Til It’s Over: SWIFT Hacks Continue

There’s no end in sight for SWIFT hacks against banks, but financial institutions can improve the security of your investment…

Identity Federation: Reaching Into Enterprise Apps

Many enterprises still struggle to keep passwords under control, even with single-sign-on technology. Innovation means new services, and each new…

Show More Loading