show episodes
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Stop living in the past. With technology changing, it's important to be aware of the latest features, functionality, and best practices. Join Allen Furmanski and Steve Beals as they interview the tech experts that helped design, build and deploy the latest Citrix technology. They'll help you understand how the magic works so you can impress others with your Citrix knowledge and expertise. So subscribe, tune in, and geek out with us on The Click-Down. Follow Allen Furmanski on Twitter - @tekg ...
  continue reading
 
XenTegra podcasts are about ServiceNow, Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news.XenTegra is THE preferred IGEL national partner!
  continue reading
 
T
The Upload w/ ControlUp
Series avatar that links to series pageSeries avatar that links to series page

1
The Upload w/ ControlUp

Eugenia Schipelliti | Jeff Johnson

Unsubscribe
Unsubscribe
Monthly
 
Take control of your digital workspace environment end-to-end AND make your end-users happy with their experience. Join Eugenia Schipelliti and Jeff Johnson as they interview industry leaders, customers, and tech gurus on how ControlUp is the simplest, most cost-effective way to observe, analyze and optimize your employees’ digital experience. They’ll help you understand the technology, trends in the industry, and best practices with digital workspaces so you can understand how to keep your ...
  continue reading
 
Combining two technologies can often be cumbersome. Every other Monday, join Neil C Hughes, a tech columnist and #1 best-selling author on Amazon, as he interviews technology companies on the latest tech they’ve developed and their integration with Citrix. If you are a tech enthusiast looking for how Citrix technology alliances have solved industry challenges and empowered people to unlock their full potential, this podcast is for you.
  continue reading
 
The Brick Bridge Consulting crew tackles current topics related to all the Citrix SaaS platforms - Podio, Workspace with Intelligence, Wrike, and ShareFile - plus related virtualization products, integrations, and extensions. This podcast features discussions about advantages, gaps, issues, and solutions of interest to Citrix developers, end-users, and the Citrix virtualization community at large. Solution talk-throughs, open discussion, interviews, technical/API concerns, and business case ...
  continue reading
 
"Virtualization Verbalization" is podcast show created so you can listen to the virtualization, cloud computing, Citrix, VMware, and Microsoft related commentary and analysis found on DABCC.com while you are on the go, in your car and/or anywhere you don't have access to sit down and read the content online.
  continue reading
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Allyson Klein (Intel) and Reuven Cohen (Citrix) talk technology. Why Digital Nibbles? We’re providing listeners with bites (or is that bytes?) of technology info. Every other week we’ll be diving into cloud computing and data center topics our audience is curious about, including big data, dev ops, mobile enterprise apps, and storage.
  continue reading
 
We dig into the big questions about how work is changing again. Questions about security, how and where we meet now, and what Gen Z can teach the rest of us about the new workplace. So many of us are searching for that sweet spot between working in the office, at home and everywhere in between. Hybrid work brings opportunities to seize, but it also brings challenges to tackle. Our host Melanie Green is learning how we can all thrive in hybrid work - for the long haul. You’ll hear compelling ...
  continue reading
 
DABCC Radio is IT News talk show hosted by Douglas Brown, MVP, CTP, vEXPERT. Douglas interviews the who’s of the Citrix, Microsoft, VMware related cloud, desktop, EUC, mobility, security, storage, and virtualization world today! DABCC Radio is hosted by Douglas A. Brown, MVP, CTP, vEXPERT Douglas Brown is the Founder and President of DABCC, Inc. Doug has more than 20 years of experience in virtualization, cloud, and server based computing technologies and markets. DABCC is the first and most ...
  continue reading
 
Welcome to Vulnerable U, a podcast where we explore the intersection of vulnerability and cyber security. Each episode, we explore how vulnerability can drive growth and foster community resilience within our industry. Get ready for thought-provoking conversations, real-life stories, and curated news that inspire you to embrace discomfort on the road to a more vulnerable you.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
This weekly podcast focusses in on the incredible power of Citrix Podio, and the impact it can have on your business when it is implemented properly. We focus in on three key types of episodes: Partner Profiles - In these episodes we speak with different Podio Partners to learn first-hand about their business, their journey with Podio, some of the key systems they have designed, and their key hints and tricks they can't live without. Client Stories - In these episodes we'll be interviewing d ...
  continue reading
 
A proven professional with international and domestic marketing, branding and sales experience in the consumer and business-to-business industries. Built a reputation on consistently driving the profitable growth and market success by focusing on market share, brand awareness and building the business bottom line for such renowned brands as Citrix Online, Philips Electronics, Norelco, Marantz, Magnavox, Netgear and Honeywell. Honors graduate and faculty member of Florida International Univer ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Frontline Chatter is a community podcast focusing on the End User Computing (EUC) market and it’s community. Every fortnight Frontline chatter will bring you the latest news in EUC and interviews with the interesting and (at times) crazy individuals in the EUC community. Facts not guaranteed, hilarity will ensue!
  continue reading
 
Innovation by design is a pilot project of members of DTX and the Design@Business Community in collaboration with the Center for Business Innovation at Chalmers University of Technology to explore podcasts as a way to share community knowledge and gain research insights.
  continue reading
 
The Art of the Pivot brings you an executive perspective on the trends, challenges and triumphs experienced by today’s most transformative business leaders. Our conversations will take listeners into the mind of decision-makers at their most critical - or shall we say, pivotal - moments. Subscribe today and learn business transformation lessons you won’t hear anywhere else. Learn more about Signavio here: https://bit.ly/2IMD7Am
  continue reading
 
In the Wheels Up Travel Podcast, Rick Versace Jr. reaches out to Travel Professionals across different industries to learn about the people behind the scenes in the travel industry. Listen as Rick interviews Corporate Travel Managers, Meetings and Event Planners, Road Warriors, and Business Owners and Executives to learn about how they have been successful in the travel industry so far and hear a little about where the travel industry will be going! Support this podcast: https://anchor.fm/wh ...
  continue reading
 
Loading …
show series
 
The Citrix ITSM Adapter service is a cloud-enabled service that, when installed in a ServiceNow instance, provides an easy way to seamlessly integrate ServiceNow capabilities with your Citrix environments. With the Citrix ITSM Adapter for ServiceNow, you can: Experience intelligent automation of employee self-services Simplify the provisioning and …
  continue reading
 
The Citrix ITSM Adapter service is a cloud-enabled service that, when installed in a ServiceNow instance, provides an easy way to seamlessly integrate ServiceNow capabilities with your Citrix environments. With the Citrix ITSM Adapter for ServiceNow, you can: Experience intelligent automation of employee self-services Simplify the provisioning and …
  continue reading
 
In my conversations with the ServiceNow partner community, there’s one thing I’m consistently asked: How do we work with you to adapt to the rapid speed of innovation and change? My answer is simple: To truly innovate, you have to understand the trends behind the innovation. ServiceNow recently collaborated with Harbor Research to scan the global m…
  continue reading
 
We are back from an unintentional summer hiatus of the IGEL community podcast. Join Seb and I as we walk through the various changes within IGEL leadership. We also dive into some great technical content (REST API, PSIGEL), and some other awesome nerdiness. Host: Barry Browne Host Sebastien Perusat Links: https://github.com/IGEL-Community/PSIGEL ht…
  continue reading
 
Japan's Threat Landscape ETLM Report reveals the dynamic challenges faced by this economic powerhouse. From state-sponsored giants to stealthy financial hackers, gain insights into the full spectrum of cyber threats impacting Japan's cutting-edge tech, automotive, and financial sectors. With an extensive network of overseas subsidiaries and proximi…
  continue reading
 
Supply chain has been a hot topic for a few years now, but so many things we need to do for a secure supply chain aren't new at all. We'll cover SBOMs, vuln management, and putting together a secure pipeline. Segment resources: https://www.solarwinds.com/assets/solarwinds/swresources/whitepaper/2111swiwhitepaper_nextgenbuild.pdf https://next.redhat…
  continue reading
 
This week Dr. Doug talks: The Year 3000, Sandman, ShadowSyndicate, National Student Clearing House, Apple, Predator, Xenomorph, Mixin, More News, and Jason Wood on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://…
  continue reading
 
Howdy friends. This week I will discuss the MGM Resorts and Caesars Entertainment hacks, Github’s launch of passkeys, Mark Cuban’s crypto wallet hack, the Microsoft AI researchers accidental data leak, the Microsoft teams phishing problem, Cisco’s acquisition of Splunk, and the latest T-mobile data breach We’re sticking with just the news on this v…
  continue reading
 
In this episode, we interview Jake Wilson, Western Governor University's Security Awareness Evangelist. We'll learn about how he built up and matured WGU's security awareness program, eliminating blind spots, and improving efficacy through data analysis and better reporting. This segment is sponsored by Living Security. Visit https://securityweekly…
  continue reading
 
Forrester Research releases a few annual reoccurring cybersecurity reports, but one of the biggest that covers the most ground is the Security Risk Planning Guide, which was recently released for 2024. One of the report's 17 authors, and research director, Merritt Maxim, will walk us through the report's most interesting insights and highlights. Th…
  continue reading
 
This week on the Security Weekly News: Passkeys, bots, hotels, conning the con, TrendMicro, Pizza, Aaran Leyland, & more! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn …
  continue reading
 
CYFIRMA’s Research team is closely monitoring an evolving cyber conflict between independent hacktivist groups in Asia and the middle east. This isn't state backed, but it's impacting small businesses. A surge in cyber-attacks from Islamic countries like Indonesia, Pakistan, Bangladesh, Afghanistan, and Malaysia, initially sparked by perceived inju…
  continue reading
 
Nathan comes on the show to discuss LLMs, such as ChatGPT, the issues we face today and in the future. Learn about prompt injection attacks, jailbreaking, LLMs for threat actors, and more! In the Security News: LVFS is not a backdoor, attackers are in physical proximity, when you need to re-cast risk, oh Fortinet, pre-installed backdoors again, dee…
  continue reading
 
On this week's episode I cover a 3 different tech company acquisitions, some major product announcements from Microsoft and Amazon plus much more!Reference Links:https://www.rorymon.com/blog/cisco-to-acquire-splunk-microsofts-biggest-leak-ever-vmware-informs-staff-of-upcoming-layoffs/By Rory Monaghan
  continue reading
 
The majority of attacks are now automated, with a growing number of attacks targeting business logic via APIs, which is unique to every organization. This shift makes traditional signature-based defenses insufficient to stop targeted business logic attacks on their own. In this discussion, Karl Triebes shares how flaws in business logic design can …
  continue reading
 
This week Dr. Doug talks: SprySocks, Lazarus, Fortinet, Juniper, CISA, Transparent Tribe, AI Art, More News, and Jason Wood on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes…
  continue reading
 
This week Dr. Doug talks: Cyberdog, Pegasus, Webex, Peach Sandstorm, SAP, Caesar, Penn State, Aaran Leyland, and More News on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secwe…
  continue reading
 
CYFIRMA Research delves deep into the new variant of RedLine Stealer, investigating this novel strain of malware, disguising as a document packaged within a zip archive that houses a batch script file. RedLine Stealer is designed to steal sensitive information from the compromised system and is available on underground forums as Malware-as-a-Servic…
  continue reading
 
At the core, every business has VIP users, who require special care and attention. We aim to simplify your life by assisting you in resolving desktop support issues now. We’ll give you the tools to find and fix problems, and even reduce IT support expenses. Fix Problems Faster Rapidly resolve desktop, network, and application issues for up to 50 VI…
  continue reading
 
Organizations still struggle with DDoS, ransomware, and personal information exfiltration. In order the prevent these attacks, we first need to understand the ‘types’ of DDoS and emerging threat techniques used by the adversary. In this interview, we explore these attacks in the context of edge computing. As edge computing use cases evolve, organiz…
  continue reading
 
While chatbots have been hailed by some as the future of IT support, some IT leaders say chatbots aren’t very robust. For example, IT teams still find themselves manually handling common incidents such as virtual application and desktop session “resets.” In simpler terms, while chatbots manage IT tickets on the frontend, they still require manual h…
  continue reading
 
Discussing ways to ensure client success with MDR and discuss the ways organizations hurt MDR efficacy with overly broad global exclusions, poor deployment practices, and poor policy hygiene. This segment is sponsored by Sophos. Visit https://securityweekly.com/sophos to learn more about them! We talk to Chris Sanders today, who has been steeped in…
  continue reading
 
Chatting With Author & Maintainer of GO Feature Flag, Software Engineering Manager- Moderation Team At Adevinta, AWS Community Builders- Thomas Poignant- Thomas Poignant said about his work and answered some of my questions. more info at https://www.smartcherrysthoughts.com
  continue reading
 
In today's ever-evolving cybersecurity landscape, the role of malware detection solutions has become more critical than ever. As cybercriminals continually evolve their evasion tactics, it's essential to understand the intricate web of strategies they employ; from signature-based to behaviour-based and anti-analysis techniques. Discover why these e…
  continue reading
 
Chatting With Founder Of Ubiquity AI,(Deeptech Startup Promoting Financial Inclusion And Managing Impairment Risk By Predicting Consumer Behaviour)-Kaveer Beharee- Kaveer said about his service and answered some of my questions. more info at https://www.smartcherrysthoughts.com
  continue reading
 
Ryan has his finger on the pulse of ransomware and response. We discuss how the initial infections are occurring, how they've changed over time, and where they are going in the future! Segment Resources: For folks to see my recent presentations: for528.com/playlist For folks to see the recordings of our recent Ransomware Summit: https://for528.com/…
  continue reading
 
Chatting With Mark A. Mckenney- Community Relationship Manager At Oak Street Health, Who Is Known As Mark The Spa Man from Dallas, Texas, United States- Mark A. Mckenney said about his work and answered some of my questions. more info at https://www.smartcherrysthoughts.com
  continue reading
 
On this week's episode I once again cover multiple security related stories including this month's Patch Tuesday news plus the fact Google and Apple released patches ahead of Patch Tuesday. I also go over the new Google Privacy Sandbox and interesting details of a lawsuit involving Patch My PC and Ivanti. For that and more, check out this episode.R…
  continue reading
 
Zed Attack Proxy is an essential tool for web app pentesting. The project just recently moved from OWASP to the Secure Software Project. Hear about the challenges of running an OSS security project, why Simon got involved in the first place, and why successful projects are about more than just code. Segment Resources: - https://www.zaproxy.org/ - h…
  continue reading
 
This week Dr. Doug talks: Mopria, Cisco, Seimens and Schneider, Word, AP Stylebook, DarkGate, GitHub, Chrome, More News, and Jason Wood on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekl…
  continue reading
 
Episode 207 of the Unsecurity Podcast is now live! This week, Brad and Pinky discuss Defcon 2023, Huntin' Ground, and the recent CloudNordic ransom case. CloudNordic says it can't, and won't, pay the ransom demand (article): https://www.theregister.com/2023/08/23/ransomware_wipes_cloudnordic/ Send any questions, comments, or feedback to unsecurity@…
  continue reading
 
Managing identities continues to add complexity for granting access to enterprise resources. Between the increasing number and expanding types of identities, including carbon-based, silicon-based, and artificial identities, and the evolution of cloud computing and remote work, managing the perimeter is now an identity problem. What risks do each of…
  continue reading
 
From pension funds to healthcare providers, ransomware is still finding plenty of victims. After a post-pandemic drop, the rate of ransomware is accelerating. Two groups getting attention are CIOp and BlackCat (ALPHV). Cl0p’s MOVEit Transfer hack to date has affected 15 million people and 121 organizations, including two large pension funds, CalPER…
  continue reading
 
Doug talks with Chat GPT in an interview format just to see what having a conversation with the AI is like. It even gets around to asking Chat GPT the famous six questions from Paul's Security Weekly. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Faceboo…
  continue reading
 
With Citrix’s renewed focus on hybrid environments and Universal subscription, this opens the door for a variety of different environment configurations across both our on-premises and cloud platforms for more customers. Alongside the Citrix platform, hyperscalers such as Azure, AWS, and GCP can deploy Citrix resources with greater agility and scal…
  continue reading
 
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on November 18, 2022. This segment will focus on (1) Why Did Sephora Get Fined $1.2M and Why Are They on Probation? (2) Why Data Privacy is Being Overhauled in 2023 (and How You Can Be Ready) Segment Resources: https://www.co…
  continue reading
 
The CYFIRMA monthly Ransomware Report report thoroughly analyses ransomware activity in August 2023, covering significant attacks, the top five ransomware families, geographical distribution, targeted industries, evolution of attacks, new ransomware groups, vulnerabilities exploited by ransomware groups, and trends between July and August 2023. Org…
  continue reading
 
On this week's episode I cover multiple security related stories including a VMware Security advisory, critical vulnerabilities in NetGear and ASUS routers plus much more!Reference Links:https://www.rorymon.com/blog/msi-addresses-bsod-issue-vmware-security-advisory-microsoft-shares-new-breach-details/…
  continue reading
 
Check out this interview from the PSW Vault, hand picked by main host Paul Asadoorian! This segment was originally published on February 4, 2013. Dr. Spafford is one of the senior, most recognized leaders in the field of computing. He has an on-going record of accomplishment as a senior advisor and consultant on issues of security and intelligence,…
  continue reading
 
Howdy friends. This week I am covering the China-backed Flax Tycoon hack on Taiwan, a Brazilian phone spyware that was hacked, the MOVEit hack statistics, the FBI and partners dismantling of Qakbot infrastructure in a massive international cyber takedown, a fake Signal app planted on the Google Play store, and the tragic death of a Saudi man by dea…
  continue reading
 
Check out this interview from the SDL Vault, hand picked by main host Doug White! This segment was originally published on January 22, 2019. Today, we begin the journey to the quantum realm on SDL. Marketing is telling us, everything is quantum now, don't be fooled, let us tell you how it works on SDL. Visit https://www.securityweekly.com/swn for a…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on January 10, 2022. There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web…
  continue reading
 
CYFIRMA delves into the Prysmax MaaS operations, currently promoting their new stealer- Prysmax Stealer. Almost all the builds of the infostealer have zero detections by signature-based solutions. The infostealer was released in June this year and has remained undetected by over 95% of antivirus vendors - no matter how many times it is scanned. It …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on March 15, 2021. In 1989, Stephen Covey first published "The 7 Habits of Highly Effective People," empowering and inspiring leaders for over 25 years. Is there an equivalent or new set of habits for CISOs? George Finney, Chie…
  continue reading
 
Having direct visibility into your access data is crucial for two reasons: 1. Simplifying audit preparation and 2. Managing progress of your identity program to ensure peak performance. Internal auditors and compliance managers need easy access to granular data points to understand and demonstrate compliance to external agencies. Gaining access to …
  continue reading
 
This week Dr. Doug talks: AI vs. Hunter Thompson, Sandstorm, BGP, Earth Estries, DOE, VMWare Aria, Key Group, DSA, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.fa…
  continue reading
 
Loading …

Quick Reference Guide