Tech Community Live: Microsoft Endpoint Manager – July 2022

Tech Community Live: Microsoft Endpoint Manager – July 2022

The wait is over! We are excited to announce the second episode of Tech Community Live: Microsoft Endpoint Manager is happening on Thursday, July 21. This quarterly series provides participants the opportunity to ask Microsoft anything about Endpoint Manager. Get your questions ready and submit them during each of the 50-minute live session or submit…

All things enterprise from Apple WWDC 2022 – iOS 16, macOS 13 Ventura, and more
| |

All things enterprise from Apple WWDC 2022 – iOS 16, macOS 13 Ventura, and more

Apple recently concluded another exciting and informative Worldwide Developers Conference (WWDC) on Friday, June 10th. Keeping with the trend, WWDC 22 was a virtual event with all keynotes and information sessions available to the public free of charge. As we expected, Apple announced new versions iOS, iPadOS, tvOS, and macOS and highlighted many of their new capabilities….

Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog post, we describe security practices for securing access to Azure Cosmos DB and show how monitoring relevant…

Making healthcare IT better for patients, clinicians, and organizations

Making healthcare IT better for patients, clinicians, and organizations

The crisis in U.S. healthcare isn’t exactly a new development — but it’s getting worse, fast. Annual industry spending has soared to $3.8 trillion, or nearly one-fifth of the nation’s GDP. But for all their investment, healthcare organizations are struggling … The post Making healthcare IT better for patients, clinicians, and organizations first appeared on…

Citrix research highlights common threats across industry verticals

Citrix research highlights common threats across industry verticals

Unlike network firewalls, which operate at layer 3 and layer 4 of the network stack, web application firewalls sit in front of the apps and operate at the app layer (L7). Their job is to monitor HTTP/S traffic to identify … The post Citrix research highlights common threats across industry verticals first appeared on Citrix…