Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Security

Security

AI and Machine Learning to Revolutionize U.S. Intelligence Community, Pentagon Official Says

NVIDIA
Don’t change the culture. Unleash the culture. That was the message one young officer gave Lt. General John “Jack” Shanahan — the Pentagon’s director for defense for warfighter support — who is hustling to put artificial intelligence and machine learning to work for the U.S. Defense Department. Highlighting the growing role AI is playing in […]

Citrix Video on how to Recover from malware and ransomware

Citrix Systems
We live in an era where ransomware and malware attacks are constantly making headlines. It seems like the electronic world we know is under constant attack. These attacks can cost millions, even billions in lost revenue, leaked information, and productivity. Cybersecurity – it’s top of mind for every organization. When it comes to providing SECURE […]

Microsoft: Detecting in-memory attacks with Sysmon and Azure Security Center

Microsoft
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks. These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk – as […]

Chasing Bad Versus Ensuring Good

Security is a thing we have to deal with more ever than before. At vEUCTechCon I presented a session about securing the workspace. The intend of that session was to create awareness of threats out there. It was also intended to show how certain products could help you. The products shown at the conference were […]

VMware: Leading our Industry into a Software-Defined Future with Strategic M&A

VMware
At VMware, we’ve been a pioneer and leading innovator in “software defined” for nearly two decades. To get there, we have championed our own internal innovation, and augmented those efforts with acquired technologies. Previously, I outlined our three key tenets of our M&A strategy – platform acquisitions, industry acceleration acquisitions, and technology tuck-ins. This strategy […]

Citrix XenDesktop Essentials Makes Migrating to Windows 10 Easy and Inexpensive

Citrix Systems
Now you can deliver a Windows 10 Enterprise desktop powered by Citrix HDX technology for as little as $32.72 per user per month, and that includes the costs for both Citrix software and Azure resources! Last month I wrote a blog post on our recently published whitepaper, “XenApp Essentials Total Cost of Ownership Analysis.” The […]

Citrix Video: Maintain control of documents and files you share with others

Citrix Systems
It’s something we do all the time. Sending a file to someone else, sharing data. But what happens when you press send on that email? The file attachment is gone and out of of your control. You have no idea where it could end up, or who could access it. That’s where Citrix ShareFile can […]

Citrix Project Chrysalis: Transforming Business for Application ISVs

Citrix Systems
Application developers are being challenged by their customers and competitors to deliver their desktop or workstation applications as cloud-based services, without compromising usability or security. This leaves developers in a quandary: how do they take their highly valued applications to the cloud — quickly, easily, and securely — and continue to deliver the great customer […]

NAKIVO Talked VM Data Protection at TECH Meets in Poznan

NAKIVO
Recently, several NAKIVO team members headed to the city of Poznan, Poland, to attend TECH meets – a data protection event held by FEN. FEN distributes and provides pre-sale and after-sale support for modern ICT products, including storage, virtualization, security, and other solutions. The educational element is an important part of FEN’s business. The company […]

Hub in Bucharest Exceeds 350 Employees

Veeam
Provides critical operational support to Veeam’s expanding global business Opened in late 2015, the office provides marketing, finance, sales and technical support, attracting the very best talent from across the region Veeam aims to continue investment in the country, growing the team to 500 by the end of 2018  Veeam® Software, the innovative provider of solutions […]

Citrix: “Unsinkable”: The Myth of Foolproof IT Security

Citrix Systems
Arguably, though, the word most commonly associated with the storied ship is “unsinkable.” The advertisement and marketing campaign prior to the ship’s launch was focused exclusively on this claim. Just look at the original marketing brochure for Titanic and its sister ship Olympic: “…as far as it is possible to do so, these two wonderful […]

Citrix Video: Restore data after ransomware attack

Citrix Systems
Ransomware attacks are far more than an inconvenience. They can be costly, and literally bring business operations to a halt. That’s something that’s been well documented in the news headlines… big companies… unfortunately attacked and finding their critical data held for ransom. But with Citrix ShareFile, there’s a way to roll back the clock, to […]

Securely deliver apps and desktops to any enterprise, from any cloud

Citrix Systems
Around the globe, people work from just about everywhere. And for organizations, those workers are often a mix of contractors, and employees. For IT, maintaining security with user identity, can be a challenge. How do you securely deliver applications, data, and desktops to workers, without putting your intellectual property at risk? Can you leverage cloud […]

Citrix Video: Contextual access to apps and data anywhere, any time, on any device

Citrix Systems
Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users, shouldn’t have access to sensitive applications and data. That’s where Citrix provides the power of contextual access which allows IT to set policies for who […]

Visit Our Sponsors