As digital transformations accelerate, the risk of cyber threats to identity has grown significantly, posing a substantial challenge for IT administrators and operations managers. In recent years, it has been reported that around 40% of companies worldwide experience some form of cyber breach annually. Understanding the types of cyber threats and leveraging tools like Microsoft …
Blog

The rise of remote work, cloud adoption, and increasing cyber threats has forced companies to rethink their security approach. For IT departments, an IT security model with the philosophy of “Never Trust, Always Verify” takes centre stage – This is where Zero Trust Network Access (ZTNA) comes in. In 2021, Citrix, a leader in secure …

On the 17th of October 2024, the European Union’s updated Network and Information Systems Directive, known as NIS 2.0, came into effect. Its aim is to bolster cybersecurity measures and resilience against cyber threats. For companies, especially those involved in public procurement tenders or are in the supply chains, understanding and achieving NIS 2.0 compliance is …

User credentials get compromised. This is a fact of life. Organizations use multi-factor authentication mechanisms to try to reduce the attack surface, but even these are not always 100% effective and breaches will happen. So, we have user authentication as a factor, and we have other solutions to provide a second factor. Imagine if we could …

As most people familiar with Citrix will know, NetScaler Gateway is one of the most deployed technologies when it comes to providing external access to Citrix delivered resources, such as virtual desktops and virtual applications. Additionally, NetScaler Gateway can also function as an SSL VPN. As such, the security posture of NetScaler Gateway is very …

Understanding the Emerging Threat and How to Stay Safe It is crucial for operations managers to stay informed about the latest threats that could compromise the integrity of their organization. One such emerging threat is known as device authentication flow phishing, a new technique that is catching many off-guard in order to get access to …

Understanding the Impact of Citrix’s Acquisition of deviceTRUST In December 2024, Citrix made a significant move by acquiring deviceTRUST, a company renowned for its innovative security solutions. This acquisition is a strategic step for Citrix, aimed at enhancing its zero-trust security posture and providing its users with advanced security features. But what exactly is deviceTRUST, …

While Multi-Factor Authentication (MFA) adds an extra layer of security by requiring multiple forms of verification, hackers are finding ways to get around it using clever phishing attacks. These attacks often trick people into giving away their MFA codes or redirect them to fake login pages that capture their credentials. Once hackers have this information, …

Watch this video about ControlUp Secure DX module. Secure DX is all about ensuring that endpoints are patched and free from vulnerabilities by using a combination of Real-time Detection, Smart Prioritization, and Continuous Remediation.

Read more about Why Multi-Factor Authentication (MFA) is so important and why Microsoft is enforcing all users to enable their MFA