State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518)

An unauthenticated remote code execution flaw (CVE-2022-27518) is being leveraged by a Chinese state-sponsored group to compromise Citrix Application Delivery Controller (ADC) deployments, the US National Security Agency has warned. “Targeting Ci… Continue reading State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518)

Kyndryl and Citrix join forces to help businesses improve workplace collaboration

Kyndryl has announced a global alliance with Citrix to help businesses improve workplace collaboration and employee productivity to address the rapidly changing requirements of today’s hybrid workforce on a global scale. By leveraging the longstanding … Continue reading Kyndryl and Citrix join forces to help businesses improve workplace collaboration

Citrix collaborates with Microsoft to help companies accelerate their digital transformations

Citrix announced it is working with Microsoft on an upcoming offering that combines Citrix’s high-definition user experience (HDX) technology, IT policy control, and ecosystem flexibility with Windows 365, offering IT administrators streamlined Citrix … Continue reading Citrix collaborates with Microsoft to help companies accelerate their digital transformations

Citrix partners with Google Cloud to enable secure remote work for customers

Last year, Citrix Systems and Google Cloud announced their commitment to helping customers accelerate and embrace hybrid work models through Desktop as a Service (DaaS) solutions. And they’re delivering on it. The companies announced that two new Citri… Continue reading Citrix partners with Google Cloud to enable secure remote work for customers

Tackling the threats posed by shadow IT

While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust security framework for their organization – encompassing all the person… Continue reading Tackling the threats posed by shadow IT

How do I select an API security solution for my business?

As the importance of Application Programming Interfaces (APIs) continues to grow and API traffic accelerates, there’s a growing need to make sure it completes its tasks securely. Traditional applications security controls are still needed, but ca… Continue reading How do I select an API security solution for my business?

Why security strategies need a new perspective

After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a well-designed cybersecurity strategy. But, confronted with a complex and confusi… Continue reading Why security strategies need a new perspective