In episode 314, Douglas Brown interviews Dan Dillman, CEO and Cliff Miller, CTP at A2U! Together they discuss the EUC world today, cloud, VDI, SBC, Microsoft MVD, DaaS, Thin Clients and much more. About A2U Based in Cranberry Township, Pa. and founded in 2003 by current CEO Dan Dillman, A2U has positioned itself as a […]
How to audit Windows Task Scheduler to detect attacks
Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.
The Role of Physical Security in IoT
Physical security, also known as silicon or hardware security, involves securing the silicon element of a system. This blog explores the different physical attacks and Arm IP on offer as a counter-measure.(read more)
The Role of Physical Security in IoT
Physical security, also known as silicon or hardware security, involves securing the silicon element of a system. This blog explores the different physical attacks and Arm IP on offer as a counter-measure.(read more)
Why the Internet of Things needs Artificial Intelligence
Artificial Intelligence (AI) and the Internet of Things (IoT) are terms that project a futuristic and science fiction image; both have been identified as causing disruption in business in 2018. In fact, says Harnil Oza, CEO of Hyperlink InfoSystem, both concepts are more real today than they have been at any time in the past. However, for companies […]
Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Software-defined perimeter brings trusted access to multi-cloud applications, network resources
Many companies today have a hybrid approach to their networking and IT infrastructure. Some elements remain in an on-premise data center, while other portions have gone to the cloud and even to multi-cloud. As a result, the network perimeter is permeable and elastic. This complicates access requirements at a time when it’s more important than […]
VMware firewall takes aim at defending apps in data center, cloud
VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and services that generate network traffic by tapping into into […]
Citrix Falls Prey to Password-Spraying Attack
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Machine Learning Makes VPNs Excellent Options For Cybersecurity
Machine learning is having a substantial impact on the future of security. One of the biggest examples is with modern VPNs. Taylor Francis Online recently published a report titled “Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features.” This report shows that VPNs use a number of machine learning technology, […]