Cross OS Integration with FSLogix to be demonstrated on booth #1504 FlexApp Application Layering solution of choice for WVD Liquidware, the leader in adaptive workspace management, today announced the latest version of its award winning ProfileUnity with FlexApp v6.8.3 that delivers new features including official FlexApp application layering support for Microsoft Windows Virtual Desktop (WVD) […]
How to fix the top 5 cybersecurity vulnerabilities
New PCI DSS Azure Blueprint makes compliance simpler
I’m excited to announce our second Azure Blueprint for an important compliance standard with the release of the PCI-DSS v3.2.1 blueprint. The new blueprint maps a core set of policies for Payment Card Industry (PCI) Data Security Standards (DSS) compliance to any Azure deployed architecture, allowing businesses such as retailers to quickly create new environments […]
IPsec vs. SSL VPN: Comparing speed, security risks and technology
Azure Security Expert Series: Learn best practices and Customer Lockbox general availability
With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? While Microsoft Azure delivers unmatched built-in security, it is important that you understand the breadth of security controls and take advantage of them […]
Azure Security Expert Series: Learn best practices and Customer Lockbox general availability
With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? While Microsoft Azure delivers unmatched built-in security, it is important that you understand the breadth of security controls and take advantage of them […]
IoT security vs. privacy: Which is a bigger issue?
If you follow the news surrounding the internet of things (IoT), you know that security issues have long been a key concern for IoT consumers, enterprises, and vendors. Those issues are very real, but Iām becoming increasingly convinced that related but fundamentally different privacy vulnerabilities may well be an even bigger threat to the success […]
Free course – Ethical Hacking: Hacking the Internet of Things
IoT devices are proliferating on corporate networks, gathering data that enables organizations to make smarter business decisions, improve productivity and help avoid costly equipment failures, but there is one big downside ā security of the internet of things remains a problem. It makes sense, then, for enterprises to try to spot vulnerabilities in the IoT […]
Cisco to buy IoT security, management firm Sentryo
Looking to expand its IoT security and management offerings Cisco plans to acquire Sentryo, a company based in France that offers anomaly detection and real-time threat detection for Industrial Internet of Things (IIoT) networks. Founded in 2014 Sentryo products include ICS CyberVision ā an asset inventory, network monitoring and threat intelligence platform ā and CyberVision […]
What do recent public SAP exploits mean for enterprises? | TECH(talk)
Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online’s Lucian Constantin discuss the fallout of 10KBLAZE, and how businesses using SAP should respond.