Cybersecurity can often seem to present impossible challenges as organizations strive to repel attack attempts. But, really, cybersecurity’s is about…
A zero-day exploit affecting the Apache Log4j version from 2.0-beta9 to 2.14.1 was made public on December 9, 2021, as…
With hybrid work here to stay and more companies deploying virtual desktops than ever before, IT teams are challenged with…
The total value of ransomware-related payments in just the first six months of 2021 ($590 million) exceeded all of 2020…
As the journey towards digital transformation continues, IT will leverage innovative technologies to transform the user experience and fuel competitive…
This blog post was co-authored by Sanyukta Nadkarni, Senior Product Manager at Citrix. Did you know there’s an attack by…
Learn about the advantages of using TrustKey's FIDO2 Security Keys with Citrix Workspace, Citrix Virtual Apps and Desktops, and Citrix Workspace app for Windows.
At Citrix, we’ve long held the position that work isn’t a place, it’s a thing you do. Workplace strategies have…
This is a guest blog post by Haichuan Hu, FIDO product manager, FEITIAN Technologies. Passwords have always been a critical…
The last several years have brought about an explosion in remote work, with millions of people around the world accessing…
Hybrid and remote work have empowered employees, and with companies benefiting from this model, distributed work environments are here to…
The complete Citrix Launchpad: Security event is now available on demand. The rapid shift to cloud and SaaS, combined with…
Today, Citrix is excited to announce the introduction of Citrix App Delivery and Security Service. The industry’s first intent-based, continuously…
What a great story I have for you this week! It follows the full story arc from a young lad…
This blog post originally appeared on Help Net Security. The Internet Age has changed so much of how we live…
Application security practitioners are navigating a security landscape that has become increasingly complex in recent years with the adoption of…
Picture this: It’s 8:45 a.m. on a Tuesday, and you’ve just fired up your laptop. Within minutes you have 10…
This blog post is based on the seventh webinar in The New Workspace series — The Top Security Predictions for…
Across the Eastern Seaboard, millions of Americans experienced the consequences of compromised cybersecurity. Earlier this month a ransomware attack led…
As you look for ways to support a primarily remote workforce, it’s critical that you modernize your security architecture. Here’s…
We’ve all heard the alarm bells ringing — organizations around the globe are suffering from a cybersecurity talent gap. While…
As part of our continued commitment to keeping Citrix products and customers secure, we have continually moved to help keep…
Based on my conversations with enterprise IT teams, there seem to be a few high priority items that consistently feature…
The proliferation of SaaS, web, and cloud-based tools in the workplace has changed how we work. No matter what the…
This is a guest blog post by Simon Berman, Chief Product Officer, Trusona In today’s enterprise, IT must cater to…