Recently, I had an opportunity to learn and work with one of Citrix’s flagship products called NetScaler. In this two-part article, I am writing a broad overview on the NetScaler’s…
Read Now
Internet of Things (IoT) devices utilize internet connectivity with embedded technology that allows them to be controlled remotely through computer interfaces giving rise to security vulnerabilities and challenges. With little…
Read Now
The latest Microsoft Intelligence Security Report shared some interesting statistics that had me thinking for several days. The report shows how businesses lose $1M per minute to cybercrime around the…
Read Now
Recently, Facebook announced that a hacker stole login information for 50 million accounts, putting over 90 million users at risk for stolen information. In related news, Uber has reached an…
Read Now
Many organizations place the responsibility of cyber security on the shoulders of their IT departments, but effective security must be a company-wide endeavor. Every security policy in the world can’t…
Read Now