On September 8, Citrix released XenApp and XenDesktop v7.11. One of the big milestones in this release is compatibility with Windows Server 2016. At the recent Citrix Synergy 2016 conference, Citrix committed to be compatible with Windows Server 2016 on...
Beware of DOCM File Attachments
In a blog post dated August 17, FireEye is reporting a huge increase in “Locky” ransomware distribution via maliciously-crafted .DOCM email file attachments (macro-enabled Word files). The health care industry seems to be the hardest-hit in this campaign, and the...
Citrix Secure Browser Service Delivers Web Apps Quickly and Simply
According to Gartner, over fifty percent of corporate applications are now delivered via the browser. Unfortunately, many Web applications, especially legacy applications, require a specific version of Internet Explorer, and/or require Flash or Java functionality that may or may not...
Beating Malware by Disrupting Command and Control
One of the key strategies in modern warfare is disrupting the enemy’s command & control infrastructure. It can also be an effective strategy in the ongoing war against malware. One of the first things that usually happens when a PC...
ESET Introduces Hardware-Encrypted USB Drive
It seems that data security is a never-ending battle, and it has become obvious that we need multiple layers of protection to deal with the proliferation and constant evolution of security threats. Today’s security topic is the ubiquitous USB “thumb...
The Case for Office 365
Update – May 7, 2015 In the original post below, we talked about the 20,000 “item” limit in OneDrive for Business. It turns out that there’s another quirk with OneDrive for Business that we didn’t touch on in our original...
Hyperconvergence and the Advent of Software-Defined-Everything – Part 2
As cravings go, the craving for the perfect morning cup of tea in jolly old England rivals that of the most highly-caffeinated Pacific Northwest latte-addict. So, in the late 1800s, some inventive folks started thinking about what was actually required...
Hyperconvergence and the Advent of Software-Defined-Everything – Part 1
The IT industry is one of those industries that is rife with “buzz words” – convergence, hyperconvergence, software-defined this and that, etc., etc. It can be a challenge for even the most dedicated IT professionals to keep up on all...
The Great Superfishing Expedition of 2015
In a move that will probably end up in the top ten technology blunders of the year, Lenovo decided, starting in September 2014, to pre-install Superfish VisualDiscovery software on some of their PCs. (Fortunately for most of the readers of...
What’s Your Password?
Earlier this month, we posted a couple of articles on the state of cyber security. Of course, one of the biggest problems with cyber security is that too many people don’t take it seriously enough. Don’t believe me? Take a...