show episodes
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
XenTegra podcasts are about ServiceNow, Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Artwork

1
XenTegra - The Citrix Session

XenTegra / Andy Whiteside / Bill Sutton

Unsubscribe
Unsubscribe
Monthly+
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Surprising insights into IT, security and the future of work – and what they mean for your business strategy. Join host Jeff Abbott and a rotating cast of global executives and thought leaders as they unpack Ivanti's latest research and share their own perspectives and experiences.
  continue reading
 
Artwork

1
ITSM Podcast covering Latest Solutions & Best Practices

Gregor Anton, Freelance Consultant with 100+ ITSM/ITAM/CRM Implementations

Unsubscribe
Unsubscribe
Monthly
 
CV: Gregor has been providing ITSM/ITAM/CRM Best Practices, Latest Solutions, Development, Consulting, Architecture, and Design since 1996, that's 27+ years, 100+ implementations, worldwide, in the UK, Europe, Australia, Singapore, Canada, USA with products such as but not limited to Ivanti Neurons for ITSM/ITAM, Ivanti Service Manager, Saleslogix CRM, HEAT. Disclaimer: Not endorsed by, affiliated with, or sponsored by Ivanti, or Infor. Any use of the software product names is descriptive of ...
  continue reading
 
Artwork

1
State of Cybercrime

Varonis, Matt Radolec

Unsubscribe
Unsubscribe
Monthly
 
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
  continue reading
 
Artwork

1
XenTegra - AVD Monthly + Nerdio

XenTegra / Andy Whiteside / Pete Downing

Unsubscribe
Unsubscribe
Monthly
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
XenTegra podcasts are about VMware, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via VMware Workspace ONE. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Artwork

1
Unpacking Software

Chocolatey Software, Inc.

Unsubscribe
Unsubscribe
Monthly
 
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Loading …
show series
 
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into …
  continue reading
 
In this episode of The Citrix Session, episode 168, host Bill Sutton from Zintegra is joined by Citrix experts Jeremy Myers and Todd Smith for an engaging discussion on the latest updates and insights into Citrix solutions. Andy Whiteside also joins in, sharing his humorous take on recent Citrix topics and providing a lighthearted but informative a…
  continue reading
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) to cover the dreaded costs of a cyberattack, and how organizations can work to proactively avoid them by addressing three strategic imperatives: attack surface, vulnerability prioritization, and data silos. Join the conversation onlin…
  continue reading
 
Matt Radolec and David Gibson discuss how an unknown attacker recently exploited a vulnerability in Proofpoint’s email routing system, allowing them to bypass security measures and send millions of spoofed emails on behalf of major companies. The co-hosts also cover: + The North Korean threat actor hired using AI + The biggest ransomware payment ev…
  continue reading
 
In Episode 38 of "Syncing with ServiceNow," your host Eddie McDonald, filling in for Andy Whiteside, dives into a crucial conversation on how HR leaders are at the forefront of business transformation. Joined by Mike Sabia, XenTegra's certified master architect, the duo explores a recent blog post titled "Survey Finds HR Leaders Will Drive Business…
  continue reading
 
Citrix Provisioning Services (PVS) is one of the two image management technologies available in Citrix Virtual Apps and Desktops and Citrix DaaS. Historically PVS has been used to deliver Citrix Virtual Apps and Desktop workloads (VDA's) to servers and virtual machines from a single image over the network. However, it can also be used without CVAD/…
  continue reading
 
In this episode of our podcast, Bill Sutton, Andy Whiteside, and Geremy Myers discuss the importance of resource centralization for IT advantage in incident recovery, inspired by a blog post by Adam Lotz, Director of Product Marketing at Citrix. We'll dive into the benefits and strategies of centralizing resources, explaining how this approach can …
  continue reading
 
In a competitive market, delivering great customer service is critical to maintaining relevance and exceeding expectations. However, many organizations struggle to manage fragmented systems, front and back offices that don’t “talk” to each other, and clunky workflows that tap into far too many systems and applications. In fact, according to the Ser…
  continue reading
 
Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 …
  continue reading
 
Mandiant APT Researcher Ofir Rozmann joins host Luke McNamara to discuss some notable Iranian cyber espionage actors and what they have been up to in 2024. Ofir covers campaigns from suspected IRGC-nexus actors such as APT42 and APT35-related clusters, as well as activity from TEMP.Zagros. For more on this topic, please see: https://blog.google/tec…
  continue reading
 
Only 52% of workers felt satisfied with their latest employee onboarding experience, according to a Paychex survey. That means just under half of new hires are dissatisfied and feel unprepared to start their new jobs. Nearly 40% of survey respondents found onboarding clear, 32% said it was confusing, and 22% said it was disorganized. Four out of fi…
  continue reading
 
Firefox gets into hot water with its latest 'prototype' that collects data without consent. Windows 11 gets more ads and helpfully uploads your data to OneDrive and Polyfill. What is there to say about that? So much, it turns out. Join Chocolatey Software's James Ruskin, Josh King and Paul Broadwith as we go through the latest tech and security new…
  continue reading
 
In this episode of State of Cybercrime, co-hosts Matthew Radolec and David Gibson dive into the details around LockBit, and cover other news including: + The MOVEit authentication bypass flaw + Developments in the Polyfill supply chain attack affecting millions of websites + Updates on the targeted campaign against Snowflake +A massive insider brea…
  continue reading
 
In this episode of our podcast, Bill Sutton, Andy Whiteside, and Geremy Myers explore key resiliency features in Citrix DaaS that are critical yet often overlooked, misunderstood, or misconfigured by administrators. We'll delve deep into the Local Host Cache (LHC) and Service Continuity features, discussing how they enable highly available environm…
  continue reading
 
XenServer has been a part of the Citrix family since the acquisition of XenSource in 2007. It is a solid player in the virtualization market particularly for running Citrix workloads. With purpose built features for improving the performance of virtual desktops such as Intellicache, Read Caching, PVS-Accelerator, and GPU virtualization many organiz…
  continue reading
 
In a competitive market, delivering great customer service is critical to maintaining relevance and exceeding expectations. However, many organizations struggle to manage fragmented systems, front and back offices that don’t “talk” to each other, and clunky workflows that tap into far too many systems and applications. In fact, according to the Ser…
  continue reading
 
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, …
  continue reading
 
Find out what the latest is in the Broadcom-VMware saga as AWS is the next target and why Microsoft is recalling the Recall defaults. Remember the CoPilot app silently installed on your Windows Servers? We talk about that too. All this and Paul trying so very hard to stay composed. Join Chocolatey Software's Gary Ewan Park, Paul Broadwith and Steph…
  continue reading
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. To vie…
  continue reading
 
Snowflake, a cloud storage platform used by some of the largest companies in the world, is investigating a targeted attack on its users who lack multifactor authentication. Join Matt Radolec and David Gibson for an episode of State of Cybercrime in which we discuss the increased attacks on Snowflake customers and share our five-point checklist for …
  continue reading
 
In today’s rapidly evolving cloud computing environment, balancing operational costs, user experience, and environmental sustainability is challenging and time-consuming for IT organizations. The recent general availability (GA) of Azure Hibernation with Citrix DaaS addresses these challenges. Since its initial tech preview, over 160 customers have…
  continue reading
 
Mandiant consultants Will Silverstone (Senior Consultant) and Omar ElAhdan (Principal Consultant) discuss their research into cloud compromise trends over 2023. They discuss living off the land techniques in the cloud, the concept of the extended cloud attack surface, how organizations can better secure their identities, third party cloud compromis…
  continue reading
 
Ivanti’s latest research found that cybersecurity teams are largely positive about the role of AI in protecting against and opposing AI-powered attacks. Yet, despite this optimism, many security professionals lack the proper understanding and defense strategy to address the risks today’s AI threat landscape poses. How can cybersecurity teams prepar…
  continue reading
 
Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure access to web and SaaS applications, particularly for environments reliant on…
  continue reading
 
Knowledge 2024 was an incredible, action-packed three days of inspiring keynotes, exciting demos and breakout sessions, and plentiful networking opportunities for the 20,000 ServiceNow customers, partners, and developers in attendance. In addition to announcements about expanded GenAI, workflow automation, and partner solutions, here are the key ta…
  continue reading
 
Michael Raggi (Principal Analyst, Mandiant Intelligence) joins host Luke McNamara to discuss Mandiant's research into China-nexus threat actors using proxy networks known as “ORBs” (operational relay box networks). Michael discusses the anatomy and framework Mandiant developed to map out these proxy networks, how ORB networks like SPACEHOP are leve…
  continue reading
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes Robert Waters (Lead PMM, Exposure Management) as they discuss the key takeaways from Verizon's latest annual Data Breach Investigations Report: persistent risk from credentials, more and more sophisticated phishing attacks, and the rising prevalence of vulnerability exploits. To view …
  continue reading
 
We chat about the latest software news, including JetBrains doubling down on process after the Rapid7 spat and Python having a bad time with PyPI and packages. Join Chocolatey Software's Gary Ewan Park, Paul Broadwith and Stephen Valdinger as we go through the latest tech and security news of the last month. Add to your calendar and find everything…
  continue reading
 
Mandiant Principal Analysts John Wolfram and Tyler McLellan join host Luke McNamara to discuss their research in the "Cutting Edge" blog series, a series of investigations into zero-day exploitation of Ivanti appliances. John and Tyler discuss the process of analyzing the initial exploitation, and the attribution challenges that emerged following t…
  continue reading
 
If you’re ready to leverage the new LTSR but are still working on your upgrade plan, don’t worry. We have quite a few resources available to help you have a successful upgrade including our plan, upgrade, succeed blog series, the latest Citrix Master Class, an FAQ blog for answers to your most pressing LTSR questions from the Citrix Master Class, a…
  continue reading
 
DISCLAIMER: Not endorsed by, affiliated with, or sponsored by Ivanti, Cherwell, ServiceNow, Remedy, Infor, or Sage. Any use of the software product names is descriptive of product experience/skillset or used to review the ITSM and CRM products. What is Kaizen, you may ask? Kaizen as you may suspect, is Japanese for "Improvement". It's a concept of …
  continue reading
 
Jurgen Kutscher, Mandiant Vice President for Consulting, joins host Luke McNamara to discuss the findings of the M-Trends 2024 report. Jurgen shares his perspective on the "By the Numbers" data, the theme of evasion of detection in this year's report, and how Mandiant consultants have been leveraging AI in purple and red teaming operations. For mor…
  continue reading
 
We chat about the latest software news, including JetBrains doubling down on process after the Rapid7 spat and Python having a bad time with PyPI and packages. Join Chocolatey Software's Gary Ewan Park, Paul Broadwith and Stephen Valdinger as we go through the latest tech and security news of the last month. Add to your calendar and find everything…
  continue reading
 
About the research See all Ivanti’s original research at ivanti.com/research. About the guest Sam Rad (Samantha Radocchia) is a lifelong student of humanity - futurist, anthropologist and entrepreneur. A charismatic speaker and performer, Sam has shared stories of radical change with global audiences on stages across 5 continents. She is a bestsell…
  continue reading
 
SANTA CLARA, Calif. – March 19, 2024 – ServiceNow (NYSE: NOW), the leading digital workflow company making the world work better for everyone, has been named a Leader in two IDC MarketScape vendor assessments: Worldwide Value Stream Management (VSM) and Agile Project and Portfolio Management 2023‑2024 Worldwide Strategic Portfolio Management (SPM) …
  continue reading
 
I’ve said this before, and I’ll say it again – if you are on the Citrix Long Term Service Release (LTSR) track, you’ve most likely been missing out on a lot of great features. But I get it; there are many valid reasons for choosing this path, including extended support. The good news is that Citrix Virtual Apps and Desktops 2402 LTSR is now availab…
  continue reading
 
Kimberly Goody, Head of Mandiant's Cyber Crime Analysis team and Jeremy Kennelly, Lead Analyst of the same team join host Luke McNamara to breakdown the current state of ransomware and data theft extortion. Kimberly and Jeremy describe how 2023 differed from the activity they witnessed the year prior, and how changes in the makeup of various groups…
  continue reading
 
The demands of modern businesses continue to reshape IT asset management (ITAM) beyond traditional practices and tools. ServiceNow commissioned Enterprise Management Associates to survey 450 global IT leaders on the state of ITAM. Our report, “A business view of ITAM,” sheds light on the most critical aspects leaders need to focus on to deliver ITA…
  continue reading
 
In today’s dynamic work landscape, remote access and virtual desktop solutions have become essential for organizations striving for flexibility and productivity. Citrix has been at the forefront of empowering businesses with innovative technologies, and now, with Intel’s new roadmap of GPU offerings, users can expect even more versatility and perfo…
  continue reading
 
Host Luke McNamara is joined by Mandiant consultants Shanmukhanand Naikwade and Dan Nutting to discuss hunting for threat actors utilizing "living off the land" (LotL) techniques. They discuss how LotL techniques differ from traditional malware based attacks, ways to differentiate between normal and malicious use of utilities, Volt Typhoon, and mor…
  continue reading
 
Organizations are under more pressure than ever to maximize the benefits of their digital transformation technology investments. Those that use technology to ramp up productivity will leapfrog the competition. At ServiceNow, we’re excited to support organizations in their digital transformation journeys. The Now Platform® Washington, D.C., release,…
  continue reading
 
Loading …

Quick Reference Guide