The job of a security professional has never been easy, but today it may be more difficult than ever. Remote…
The proliferation of SaaS, web, and cloud-based tools in the workplace has changed how we work. No matter what the…
Many organizations are training their employees how to recognize social engineering and how attackers will attempt to distribute malware to…
While it may not have seemed critical at the beginning of 2020, business continuity planning (BCP) has become a top…
Citrix Workspace is helping to shape the future of work by organizing, guiding, and automating work, and Citrix Cloud has…
With a rapid shift to remote work for so many companies, work styles have also shifted. One of the biggest…
Business disruptions can impact organizations of any size and can negatively impact productivity, customer satisfaction, brand reputation, and revenue. Disruptions…
When end users are accessing your corporate resources through personal or unmanaged devices, a holistic security strategy should include protecting…
This blog post was updated June 15, 2020. We’re excited to announce the general availability of Federated Authentication Service (FAS)…
According to the 2019 Verizon Data Breach Investigations report, 62 percent of data breaches involved the use of stolen credentials,…
Citrix and Google share a vision of a future of work that is personal, adaptive, and agile. In this world,…
In the chain of IT infrastructure security, passwords are the weakest link. It’s easy to blame end users for creating…
One of my favorite things about talking to Citrix customers and partners is hearing their stories. I’ve heard stories that…
McKinsey coined the term “war for talent” in 1997 to describe the battle among organizations competing for the best talent.…
Organizations of all shapes and sizes have turned to G Suite to spur productivity, collaboration, and security. They’ve embraced the…
“If your only tool is a hammer, every problem looks like a nail.” — Abraham Maslow If you made a…
This is the first post in a series — “What does Citrix do?” — that explores our technology and how…