Protecting BYOPC corporate access using conditional access

The advent of the Bring your own PC (BYOPC) era This has got to be the most popular phrase in IT blogs in the past year, but yeah, we noticed – 2020 wasn’t a normal year, especially for the workplace. As we all know, we moved the workplace home and sta… Continue reading Protecting BYOPC corporate access using conditional access

Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While man… Continue reading Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?

Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships.   But we’re not talking psychology today. We’re talking cybersecuri… Continue reading Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?