American software company
POPULARITY
Categories
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — It's 8ft skeleton season.02:18 - BHIS - Talkin' Bout [infosec] News 2025-09-0203:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets'13:46 - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling17:44 - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K19:39 - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we're working through it.'20:56 - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 202522:43 - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-842425:20 - Story # 8: First known AI-powered ransomware uncovered by ESET Research30:00 - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception32:06 - Story # 10: TransUnion suffers data breach impacting over 4.4 million people34:17 - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI35:20 - Story # 12: They weren't lovin' it - hacker cracks McDonald's security in quest for free nuggets, and it was apparently not too tricky39:29 - Identify the birds you see or hear with Merlin Bird ID40:04 - Story # 13: Detecting and countering misuse of AI: August 202551:31 - Story # 14: I'm a Stanford student. A Chinese agent tried to recruit me as a spy
In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Annunciation Catholic Church Attack • Minneapolis Suspect Knew Her Target, but Motive Is a Mystery• Shooter who opened fire on Minneapolis Catholic school posted rambling videos• Robin Westman: Minneapolis gunman was son of church employee• Robin Westman posted a manifesto on YouTube prior to Annunciation Church shooting• Minneapolis school shooter wrote “I am terrorist” and “Kill yourself” in Russian on weapon magazines and listened to Russian rappers• Minneapolis Catholic Church shooter mocked Christ in video before attack• Minneapolis school shooter 'obsessed with idea of killing children', authorities say• Minnesota Mass Shooter Steeped in Far-Right Lore, White Nationalist Murderers• In Secret Diaries, the Church Shooter's Plans for Mass Murder• Minneapolis church shooting search warrants reveal new details and evidence• 'There is no message': The search for ideological motives in the Minneapolis shooting• Minneapolis Church Shooting: Understanding the Suspect's Video• More Of Minnesota Shooter's Writings Uncovered: ‘Gender And Weed F***ed Up My Head'• Classmates say Minnesota school shooter gave Nazi salutes and idolized school shootings back in middle schoolHoax Active Shooter Reports• More than a dozen universities have been targeted by false active shooter reports• This Is the Group That's Been Swatting US Universities• FBI urges students to be vigilant amid wave of swatting hoaxesAI & Cyber Threats • The Era of AI-Generated Ransomware Has Arrived• Researchers flag code that uses AI systems to carry out ransomware attacks & First known AI-powered ransomware uncovered by ESET Research • Anthropic: Detecting and countering misuse of AI: August 2025• A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four yearsCountering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System• FBI warns Chinese hacking campaign has expanded, reaching 80 countries• Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks• UK NCSC: UK and allies expose China-based technology companies for enabling global cyber campaign against critical networksQuick Hits:• Storm-0501's evolving techniques lead to cloud-based ransomware • Why Hypervisors Are the New-ish Ransomware Target• FBI Releases Use-of-Force Data Update• Denmark summons US envoy over report on covert American ‘influence operations' in Greenland• Falsos Amigos• Surge in coordinated scans targets Microsoft RDP auth servers• Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424• Citrix patches trio of NetScaler bugs – after attackers beat them to it• U.S., Japan, and ROK Join Mandiant to Counter North Korean IT Worker Threats• US sanctions fraud network used by North Korean ‘remote IT workers' to seek jobs and steal money• H1 2025 Malware and Vulnerability Trends • The FDA just overhauled its COVID vaccine guidance. Here's what it means for you• 25 August 2025 NCSC, AFOSI, ACIC, NCIS, DCSA, FBI, ED, NIST, NSF bulletin • DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says• Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,' ‘negligence'• Email Phishing Scams Increasingly Target Churches
I cover the announcement of Windows 11 25H2 entering preview, worrying details about Citrix Netscaler vulnerabilities, a company changing AI approach after public failures and much more! Reference Links: https://www.rorymon.com/blog/windows-11-25h2-now-in-preview-citrix-netscaler-vulnerabilities-disclosed-amazing-ai-stethoscope/
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Johna Till Johnson, CEO and founder, Nemertes Thanks to our show sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their Agentic AI SOC Platform automates the tedious stuff: triaging, investigating, and responding to alerts - so your analysts can focus on real threats. Think 10x faster response times and a smarter way to secure your business. Learn more at prophetsecurity.ai. All links and the video of this episode can be found on CISO Series.com
When you're not in the driver's seat of your life, someone else will drive and they'll drive over you.In this episode of Women Awakening, Cynthia James sits down with Racheryl McCrary, a former performing artist who now guides conscious leaders as a spiritual director and executive coach.They talk about how her theater roots became the foundation for executive presence, how a spiritual calling led her to launch a new community, and why now is the time for women to own their voice without apology.Watch the full episode of Women Awakening: Owning Your Power: Amplifying Presence, Purpose, and Heart.Enjoy the podcast? Subscribe and leave a 5-star review.Racheryl McCrary is a Georgetown University–certified leadership coach and the CEO of TAO Leadership Development. She specializes in helping leaders elevate their personal brand, executive presence, and virtual communication. Over her career, she has empowered more than 1,000 leaders across organizations like American Express, Procter & Gamble, Cisco, HBO, PayPal, the CIA, and Harvard Business School. She is also the creator and host of the Virtual Presence Webinar series for Citrix and the Communicate With Impact for Virtual Teams podcast.Join the A WOMAN'S VOICE™ Summit here:https://learning.siliconvalleycsl.com/a-womans-voice-summit-2025Connect with Racheryl:Website: https://rasherylmccreary.com/Facebook: https://www.facebook.com/rasherylInstagram: https://www.instagram.com/rasheryl.mccreary/LinkedIn: https://www.linkedin.com/in/rasherylmccreary/Cynthia James is a transformational speaker, emotional integration coach, and host of the Women Awakening podcast. With a background as a former actress and Star Search champion, she brings creativity and depth to her work. Cynthia holds master's degrees in consciousness studies and spiritual psychology, and she's the author of multiple bestselling books, including I Choose Me. Through her global retreats, coaching, and speaking, she helps women step into their power, live authentically, and lead with purpose.Connect with Cynthia James:Website: https://www.cynthiajames.net/LinkedIn: https://www.linkedin.com/company/cynthia-james-enterprises/YouTube: https://www.youtube.com/user/WhatWillSetYouFreeInstagram: https://www.instagram.com/cynthiajames777/ Facebook: https://www.facebook.com/cynthiajamestransforms
The FBI shares revelations on Salt Typhoon's reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. Citrix patches a critical vulnerability under active exploitation. The U.S. sanctions a North Korean-linked fraud network. Ransomware is rapidly evolving with generative AI. Our guest is Brandon Karpf, speaking with T-Minus host Maria Varmazis connecting three seemingly disparate stories. Who needs a tutor when you've got root access? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert talking with T-Minus host Maria Varmazis. Brandon decided to do a stump the host play for this month's space and cybersecurity segment. Selected Reading Chinese Spies Hit More Than 80 Countries in ‘Salt Typhoon' Breach, FBI Reveals (WSJ) NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations (NSA) Critical Infrastructure Leaders and Former National Security Officials Address Escalating Cyber Threats at Exclusive GCIS Security Briefing (Business Wire) Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense (CyberScoop) Maritime cybersecurity is the iceberg no one sees coming (Help Net Security) Healthcare Services Group reports data breach exposing information of over 624 K individuals (Beyond Machines) Over 28,000 Citrix devices vulnerable to new exploited RCE flaw (Bleeping Computer) US sanctions fraud network used by North Korean 'remote IT workers' to seek jobs and steal money (TechCrunch) The Era of AI-Generated Ransomware Has Arrived (WIRED) Spanish police arrest student suspected of hacking school system to change grades (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabilities CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 Citrix patched three vulnerabilities in Netscaler. One is already being exploited https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938&articleTitle=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_7775_CVE_2025_7776_and_CVE_2025_8424 git vulnerability exploited (CVE-2025-48384) A git vulnerability patched in early July is now being exploited https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9
The FCC removes 1,200 voice providers from the US phone network, a cyberattack shuts down Nevada's state government services; hackers breach Salesloft and pivot into Salesforce accounts, and Citrix patches yet another zero-day. Show notes Risky Bulletin: FCC removes 1,200 voice providers from US phone network
Het Openbaar Ministerie (OM) heeft een strafrechtelijk onderzoek gestart naar de hack bij het laboratorium Clinical Diagnostics. Door de hack zijn de gegevens van bijna een half miljoen Nederlandse vrouwen gestolen, hoewel de dader beweert dat die weer verwijderd zijn. Niels Kooloos vertelt erover in deze Tech Update. Het onderzoek van het OM richt zich vooral op de personen die achter de verantwoordelijke hackersgroep Nova zitten. De politie zou digitale sporen gevonden hebben die mogelijk naar hun identiteiten kunnen leiden. Dat is twee weken geleden al gebeurd, maar vanwege 'het opsporingsbelang' heeft het OM dat nu pas bekend gemaakt. Tegelijkertijd melden steeds meer slachtoffers van de hack zich bij advocatenkantoren om een massaclaim tegen Clinical Diagnostics voor te bereiden. In totaal hebben 70 duizend vrouwen wiens gegevens zijn gelekt zich al gemeld. Omdat het OM zelf al onderzoek doet, hoeven vrouwen 'geen aangifte meer te doen' bij die organisatie. Verder in deze Tech Update: Door een nieuw lek in de software van Citrix zijn meer dan duizend Nederlandse computersystemen kwetsbaar See omnystudio.com/listener for privacy information.
Referências do EpisódioNetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424CWE-119: Improper Restriction of Operations within the Bounds of a Memory BufferWidespread Data Theft Targets Salesforce Instances via Salesloft DriftZipLine Campaign: A Sophisticated Phishing Attack Targeting US CompaniesRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Send us a textThe moment Aaron Plush was pulled from his second-grade classroom to test early Macintosh computers, his path in technology was set. This formative experience sparked a journey that would lead him through global program management roles and transformational leadership positions at major corporations like Citrix.Aaron brings a refreshingly authentic approach to the complex world of project management and organizational transformation. His methodology begins with something surprisingly simple yet often overlooked: listening. "There's no bigger mistake any leader can make than implementing change without understanding the organization's landscape," he explains. This people-centric philosophy has become his hallmark in an industry often dominated by technical solutions seeking problems.What makes Aaron's approach particularly powerful is his integrated leadership style that seamlessly blends faith, discipline, and business acumen. When managing high-stakes initiatives, he maintains perspective through methodical execution: "We don't take the entire plate and throw it in our face. We do it bite-sized pieces." This calm, measured approach, combined with radical accountability, has proven effective across Fortune 500 companies and complex technology implementations.His perspective on emerging technologies like AI is equally thoughtful. Rather than focusing on the technology itself, Aaron emphasizes understanding the problem first, then leveraging AI as an enhancement tool. "It's about using technology for the purposes of what you need it for," he advises, encouraging adoption without fear.Perhaps most compelling is Aaron's commitment to developing others. When asked what qualities he looks for in mentees, his answer is striking: "I don't." Anyone expressing a desire to grow receives his support, regardless of their current position or potential. This generosity of spirit extends to his view of success itself—"my journey is about bringing others along with me."Connect with Aaron at www.aaronrplush.com or through his Authentic Realness podcast to learn more about his approach to leadership, technology, and personal development. His story reminds us that even in our increasingly digital world, authentic human connection remains the foundation of meaningful transformation.Thanks for tuning in to this episode of Follow The Brand! We hope you enjoyed learning about the latest marketing trends and strategies in Personal Branding, Business and Career Development, Financial Empowerment, Technology Innovation, and Executive Presence. To keep up with the latest insights and updates from us, be sure to follow us at 5starbdm.com. See you next time on Follow The Brand!
In this episode of the "ControlUp" podcast, hosts Jeff and Eugenia introduce and discuss ControlUp's new Disk Monitor tool with its creator, Chris Twiest. The Disk Monitor is designed to track all read and write activity on hard drives, providing valuable insights into disk usage.Chris explains that the Disk Monitor was initially developed to address challenges in non-persistent environments like Citrix, where cache issues can impact performance. Unlike traditional tools like Procmon, the Disk Monitor operates efficiently, providing detailed reports on disk activity without compromising system performance.The discussion expands to cover use cases for persistent environments, such as laptops, where the tool can help diagnose issues like sudden disk space depletion.Chris also shares insights into upcoming developments, including the Disk Monitor 2.0, which will monitor writes to FSLogix, and a future Network Monitor tool.
In this episode of Cybersecurity Today, host David Shipley covers critical security updates and vulnerabilities affecting Microsoft Exchange, Citrix NetScaler, and Fortinet SSL VPNs. With over 29,000 unpatched Exchange servers posing a risk for admin escalation and potential full domain compromise, urgent action is needed. Citrix Bleed 2 is actively being exploited, with significant incidents reported in the Netherlands and thousands of devices still unpatched globally. Fortinet SSL VPNs are experiencing a spike in brute force attacks, hinting at a possible new vulnerability on the horizon. Lastly, Shipley highlights notable moments from DEFCON 33, including innovative security hacks and sobering realities of the hacker community. Tune in for detailed breakdowns and insights on how to stay vigilant against these threats. 00:00 Introduction and Overview 00:32 Microsoft Exchange Vulnerability 02:54 Citrix Bleed Two Exploits 05:21 Fortinet SSL VPN Brute Force Attacks 07:39 Insights from DEFCON 33 13:46 Conclusion and Final Thoughts
In Episode 185 of The Citrix Session, Andy Whiteside, Bill Sutton, and Todd Smith explore how Citrix NetScaler is evolving into a true Swiss Army knife for security—delivering protection not just for Citrix workloads, but for all applications. The conversation dives into the looming challenge of quantum computing and the “harvest now, decrypt later” threat, where bad actors collect encrypted data today to exploit when quantum capabilities emerge.Todd and Bill unpack how NetScaler is leading the way with post-quantum cryptography (PQC) readiness, new encryption standards aligned with NIST guidelines, and GA support for quantum-resistant algorithms. They also cover key advancements like HTTP/3 over QUIC, enhanced DNS security, reCAPTCHA v3 integration, and the Netscaler Console for fleet-wide visibility, compliance, and automation.Whether you're concerned about securing sensitive data, meeting future compliance requirements, or leveraging cutting-edge application firewall capabilities, this episode will help you understand why now—not later—is the time to prepare for the quantum era.
In Episode 184 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to explore the newly enhanced integration between Citrix DaaS and Amazon WorkSpaces Core Managed Instances.The team dives into what's new in this “version 2” release, how it enables flexible, cost-effective VDI deployment, and why it's a game-changer for customers with AWS and Microsoft licensing commitments.Key topics include:What Account Technology Strategists (ATS) really doThe evolution from WorkSpaces Core to Core Managed InstancesSupport for Machine Creation Services (MCS) and non-persistent desktopsHybrid identity management with Intune and Azure ADHow Citrix maintains a unified admin and user experience across cloudsAWS savings plans and funding resources for pilotsWhether you're planning a cloud migration or optimizing your existing DaaS strategy, this episode is packed with valuable insights for IT leaders and practitioners alike.
In Episode 183 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to break down how IT leaders can make smarter decisions when rolling out Windows 365. They explore the growing importance of deep visibility, flexible deployment models, and persona-based strategies to support modern hybrid environments. This discussion highlights how Citrix technology enhances Windows 365 with features like HDX optimization, unified access through Workspace, and policy-based control—all while simplifying complex enterprise needs.What you'll learn:Why a “one-size-fits-all” approach doesn't work for Windows 365 rolloutsHow Citrix enables seamless access to Windows 365, SaaS, on-prem, and cloud appsThe role of user personas in right-sizing application deliveryWhere Tech Zone fits into your strategy for technical insights and deployment guidesHow Citrix licenses support unlimited Windows 365 connections
Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss: Microsoft tried to make outsourcing the Pentagon's cloud maintenance to China okay (it was not) She shells Sharepoint by the sea-shore (by ‘she' we mean ‘China') Four (alleged) Scattered Spider members arrested (and bailed) in the UK Hackers spend $2700 to buy creds for a Brazilian payment system, steal $100M Fortinet has SQLI in the auth header, Citrix mem leak is weaponised, HP hardcodes creds and Sonicwalls get user-moderootkits. Just security vendor things! This week's episode is sponsored by Airlock Digital. CEO David Cottingham talks through what it takes to build a mature, resilient management platform for a security critical system. This episode is also available on Youtube. Show notes Update on DOD's cloud services Microsoft to stop using engineers in China for tech support of US military, Hegseth orders review A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers While DOD policy bans unauthorized apps like TikTok from being on employees phones over national security risks Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security National Guard was hacked by China's 'Salt Typhoon' group, DHS says Suspected contractor for China's Hafnium group arrested in in Italy | Cybersecurity Dive Singapore accuses Chinese state-backed hackers of attacking critical infrastructure networks | The Record from Recorded Future News UK Arrests Four in ‘Scattered Spider' Ransom Group – Krebs on Security Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods Brazilian police arrest IT worker over $100 million cyber theft | The Record from Recorded Future News At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds | WIRED Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment | The Record Indian crypto exchange CoinDCX says $44 million stolen from reserves | The Record Chainalysis: $2.17 billion in crypto stolen in first half of 2025, driven by North Korean hacks | The Record PoisonSeed bypassing FIDO keys to ‘fetch' user accounts Risky Bulletin: Browser extensions hijacked for web scraping botnet A Startup is Selling Data Hacked from Peoples' Computers to Debt Collectors A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations | TechCrunch Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says File transfer company CrushFTP warns of zero-day exploit seen in the wild | The Record HPE warns of hardcoded passwords in Aruba access points Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) Researchers, CISA confirm active exploitation of critical Citrix Netscaler flaw | Cybersecurity Dive Google finds custom backdoor being installed on SonicWall network devices - Ars Technica Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
In Episode 182 of The Citrix Session, host Bill Sutton and Citrix's Todd Smith dive into the expanded capabilities of XenServer 8.4, Citrix's enterprise-grade hypervisor. No longer just for Citrix workloads, XenServer is now fully supported for all workloads under both Citrix Platform Licensing and UHMC—making it a strong contender for organizations exploring alternatives to VMware and Hyper-V.
In Episode 181 of The Citrix Session, hosts Bill Sutton and Todd Smith dive into the key takeaways from the blog “What's New and Next with Citrix: Q&A from our May 2025 Webinar.” From release cadence updates and licensing clarity to enhanced integration with Windows 365 and Nutanix, this episode is packed with forward-looking insights for Citrix admins and tech leaders.
In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet's FortiWeb also faces a critical pre-auth remote code execution flaw that demands immediate patching. Additionally, significant vulnerabilities in AI-driven developments are highlighted, including shortcomings in Jack Dorsey's BitChat app and a method to extract Windows keys from ChatGPT-4. The episode emphasizes the importance of timely updates, robust security measures, and the potential risks involved with AI-generated code. 00:00 Introduction and Overview 00:35 Urgent Citrix Vulnerability Alert 03:26 Fortinet FortiWeb Exploit Details 06:23 Ingram Micro Ransomware Recovery 09:26 AI Coding and Security Risks 14:03 ChatGPT Security Flaw Exposed 17:20 Conclusion and Contact Information
In the premiere episode of this new Pulse Check series, Ctrl + Create: AI for Creatives, host Dave Hunt sits down with Matt Owens, Co-founder and Chief Design and Innovation Officer at Athletics. With decades of experience in design, branding, and demystifying new tools, Matt shares how his team is using AI to push creative boundaries, streamline workflows, and preserve the magic of craft. This episode explores how creative studios—and higher ed marketers—can embrace AI with curiosity and confidence, not fear.Guest Name: Matt Owens, Chief Design and Innovation Officer & Founding Partner, Athletics - http://athleticsnyc.comGuest Socials: https://www.linkedin.com/in/volumeone/https://www.instagram.com/mattvolumeoneGuest Bio: Matt Owens is a New York-based designer, creative director, founder, and entrepreneur, and the author of the book A Visible Distance: Craft, Creativity, and the Business of Design, published by Set Margins. With 25 years of experience across all facets of creative practice, Matt works with ambitious leaders, strategists, designers, creative technologists, and marketers to bring rich multi-faceted creative ideas and experiences to life.A Texas native, Matt studied graphic design at the University of Texas at Austin and received a Master's Degree in graphic design from Cranbrook Academy of Art. He is a founding partner of Athletics, a brand innovation studio based in New York City, and serves as Chief Design and Innovation Officer. Founded in 2004, Athletics has grown through a commitment to design innovation and an ability to work with clients such as Major League Soccer, IBM, Citrix, Google, Amazon, and Square to meet the challenges of contemporary brand-building.Matt has helped teams leverage new tools and processes across disciplines and led projects for clients including Abbott, NYU, XQ, Guild, The Pulitzer Prizes, and Culligan. He has spoken internationally, and his work has been recognized by the Art Directors Club, The American Center for Design, and the AIGA. His thought leadership has been published in Print Magazine, Fast Company, Ad Week, and AdAge. His early experimental design work at volumeone.com was selected to be in SFMoMA's permanent collection. In his spare time, Matt can be found writing about design and entrepreneurship on Substack and Medium, experimenting in Cinema 4D, and developing new ventures like Kingston Standard and the creative and strategic foresight collective Preseason. - - - -Connect With Our Host:Mallory Willsea https://www.linkedin.com/in/mallorywillsea/https://twitter.com/mallorywillseaAbout The Enrollify Podcast Network:The Higher Ed Pulse is a part of the Enrollify Podcast Network. If you like this podcast, chances are you'll like other Enrollify shows too!Enrollify is made possible by Element451 — the next-generation AI student engagement platform helping institutions create meaningful and personalized interactions with students. Learn more at element451.com.Attend the 2025 Engage Summit! The Engage Summit is the premier conference for forward-thinking leaders and practitioners dedicated to exploring the transformative power of AI in education. Explore the strategies and tools to step into the next generation of student engagement, supercharged by AI. You'll leave ready to deliver the most personalized digital engagement experience every step of the way.Register now to secure your spot in Charlotte, NC, on June 24-25, 2025! Early bird registration ends February 1st -- https://engage.element451.com/register
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host CitrixBleed2 PoC Posted (CVE-2025-5777) WatchTwer published additional details about the recently patched CitrixBleed vulnerability, including a PoC exploit. https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ Instagram Using Six Day Certificates Instagram changes their TLS certificates daily and they use certificates that are just about to expire in a week. https://hereket.com/posts/instagram-single-day-certificates/
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• The GRIP is one year old and to celebrate, we're running an anniversary sale!!• Join the GRIP in July and use promo code HOTJULY2025 to receive a 20% discount!• (TLP:CLEAR) Hostile Nation States Employing Non-State Actors• Surge in MOVEit Transfer Scanning Could Signal Emerging Threat Activity• ‘Suspended animation': US government upheaval has frayed partnerships with critical infrastructure• Short-term extension of expiring cyber information-sharing law could be on the table• Gate 15 is excited to offer a low-cost ransomware resilience exercise for executives! Contact us today for more information on this great opportunity!Main Topics:Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest. CISA, the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA) published Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest. This joint fact sheet details the need for increased vigilance for potential cyber activity against U.S. critical infrastructure by Iranian state-sponsored or affiliated threat actors. Defense Industrial Base companies, particularly those possessing holdings or relationships with Israeli research and defense firms, are at increased risk. At this time, we have not seen indications of a coordinated campaign of malicious cyber activity in the U.S. that can be attributed to Iran. Beazley Report: U.S. Executives Misjudge Their Cyber Preparedness. U.S.-based executives feel more prepared to counter cyber threats, potentially indicating a false sense of security because many companies lack the ability to be adequately preparedness, according to a new report from specialist insurer Beazley. According to the report, Spotlight on Tech Transformation & Cyber Risk 2025, the perception of cyber resilience rose to 81% from 73% a year ago. Hostile Events:• A violent ambush in Idaho leaves 2 firefighters dead and 1 injured. What to know about the attack• Suspect Identified in Deadly Ambush of Idaho Firefighters• Chilling ‘coincidence' of Idaho shooting sends internet sleuths into overdrive• Gunman started Idaho blaze and then fatally shot 2 firefighters in ambush attack, officials say• Here's a timeline of how the Canfield Mountain ambush shooting unfolded• Multiple firefighters reportedly shot while responding to fire near Coeur d'Alene• Europol: New report - major developments and trends on terrorism in Europe in 2024Quick Hits:• Canadian Centre for Cyber Security - Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 • Over 1,200 Citrix servers unpatched against critical auth bypass flaw• The State of Ransomware 2025• Scattered Spider hackers shift focus to aviation, transportation firms • Scattered Spider's Calculated Path from CFO to Compromise • M&S fashion rivals ‘benefited from its pause on online orders after cyber-attack' • Ransomware attack contributed to patient's death• Canada orders Chinese CCTV biz Hikvision to quit the country ASAP• FBI PSA - Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraud• 50 Customers of French Bank Hit by Insider SIM Swap Scam; An intern at Société Générale is believed to have facilitated the theft of more than EUR1mn (USD1.15mn) from the bank's customers.• State of CPS Security 2025: Building Management System Exposures • H1 2025 Crypto Hacks and Exploits: A New Record Amid Evolving Threats
Managing virtual desktops doesn't have to be hard. In Episode 180 of The Citrix Session, Bill Sutton is joined by Citrix's Todd Smith and Geremy Meyers—and special guest Phil Sellers from XenTegra—to break down the latest innovations from the Citrix + Nutanix partnership.What's New & Why It Matters:One Integration Point: Citrix now supports Prism Central, giving you seamless access to multiple Nutanix clusters—on-prem or in the cloudHybrid Cloud Ready: Simplify and scale across data centers and hyperscalers with Nutanix Cloud Clusters (NC2)Image Management at Scale: Clone and replicate Citrix golden images across clusters effortlesslyNetScaler VPX Now on AHV: Official support eliminates hardware and hypervisor lock-inFaster, Simpler Admin Experience: Unified visibility, better resiliency, and zero image refactoringBottom Line: Citrix and Nutanix just made managing and scaling VDI a whole lot easier—and more cost-effective.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerability in the user (not admin) part of Web Panel can be used to execute arbitrary code https://fenrisk.com/rce-centos-webpanel Gogs Arbitrary File Deletion Vulnerability Due to the insufficient patch for the CVE-2024-39931, it's still possible to delete files under the .git directory and achieve remote command execution. https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 Let s Encrypt Will Soon Issue IP Address-Based Certs Let s Encrypt is almost ready to issue certificates for IP address SANs from Let's Encrypt's production environment. They'll only be available under the short-lived profile (which has a 6-day validity period), and that profile will remain allowlist-only for a while. https://community.letsencrypt.org/t/getting-ready-to-issue-ip-address-certificates/238777
If you like what you hear, please subscribe, leave us a review and tell a friend!
As hardware costs climb and Windows 11 migration looms, IT leaders face a tough choice: upgrade or optimize. In Episode 179 of The Citrix Session, Bill Sutton (XenTegra) and Todd Smith (Citrix) unpack a smarter path—repurposing aging hardware with Citrix Elux and Scout.Why Listen:Learn how tariffs and supply chain delays are impacting endpoint strategiesDiscover how Citrix Elux enables secure, seamless access to Windows 11 on old devicesUnderstand how Citrix's Scout tool simplifies endpoint managementExplore flexible deployment options, including boot-to-VDI and Imprivata tap-and-goHear how NetScaler and Win365 fit into a hybrid IT model—no rip and replace requiredKey Takeaway: You don't need new hardware to modernize your workspace. Citrix's built-in solutions help you do more with what you already have.
In Episode 178, the Citrix Session team dives into the latest on-premises release—Citrix Virtual Apps and Desktops 2503. Join Bill Sutton, Geremy Meyers, and Todd Smith as they break down the top new features, including auto-scale insights, a redesigned Web Studio, enhanced storage load balancing, dynamic display rendering with Build-to-Lossless, and expanded integration of UberAgent with Director. Whether you're an admin optimizing cloud costs or an IT leader tracking app usage, this update brings serious power to your Citrix toolkit.
In this CPQ Podcast episode, Frank Sohn speaks with Ethan, co-founder of Vendori, a fast-growing CPQ startup focused on reducing implementation time, cutting costs, and delivering faster ROI through a no-code, multi-tenant solution. Ethan shares his journey from Wall Street M&A at Merrill Lynch to leadership roles at SAP and Citrix, where he saw firsthand how traditional CPQ tools often caused more friction than they solved—especially for companies shifting to SaaS. That experience inspired him to create a better path forward. Vendori is built for B2B tech companies—hardware and SaaS—starting with 5-10 CPQ users and scaling into the hundreds. The platform offers subscription management, guided selling, and AI-assisted workflows, while boasting integrations with Salesforce, Hubspot, Oracle, SAP, Teams, and Slack—with some customers onboarded in under a day. In the episode, Ethan unpacks: Why many customers are three years into “18-month” CPQ rollouts How Vendori focuses on control and velocity The real role of AI in CPQ—and why price optimization isn't the holy grail What it means to build a CPQ company around family, faith, and community If you're exploring CPQ or rethinking your current solution, this is one episode you won't want to miss. Vendori contact information: Website: https://vendori.com/ LinkedIn: https://www.linkedin.com/in/ethan-garonzik-1565aa2b/
In this episode of The Citrix Session, host Bill Sutton is joined by Todd Smith, recently promoted Senior Manager for Account Technology Strategists (ATS) in the public sector at Citrix. Together, they dive into a pivotal blog article released at Citrix UNITE in New Orleans—“Citrix and NVIDIA Partner to Deliver AI Virtual Workstations.”What's Inside:What the ATS role really means—and why it matters more than everHow Citrix is evolving to support AI workloads using NVIDIA RTX virtual workstationsThe security, scalability, and flexibility of Citrix's new AI integrationWhy protecting your data from public LLMs is now mission-criticalReal-world AI use cases in enablement, call centers, and endpoint accelerationWhether you're a Citrix veteran or just exploring virtual desktops for AI development, this episode unpacks how Citrix is helping organizations innovate securely and efficiently—with existing infrastructure, enhanced GPU value, and powerful NVIDIA partnerships.Key takeaway: AI isn't just for “the nerds in the back room” anymore. Citrix is making it accessible, secure, and scalable—right at the edge of innovation.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft updated its "Release Health" notes with details regarding issues users experiences with Windows Hello, Citrix, and Roblox. Microsoft also released an emergency update for Office 2016 which has stability problems after applying the most recent update. https://support.microsoft.com/en-us/topic/april-8-2025-kb5055523-os-build-26100-3775-277a9d11-6ebf-410c-99f7-8c61957461eb https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3521 https://support.microsoft.com/en-us/topic/april-10-2025-update-for-office-2016-kb5002623-d60c1f31-bb7c-4426-b8f4-69186d7fc1e5 Dell Updates Dell releases critical updates for it's Powerscale One FS product. In particular, it fixes a default password problem. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities Langflow Vulnerablity (possible exploit scans sighted) CVE-2025-3248 Langflow addressed a critical vulnerability end of March. This writeup by Horizon3 demonstrates how the issue is possibly exploited. We have so far seen one "hit" in our honeypot logs for the vulnerable API endpoint URL. https://www.horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/
In episode 176 of The Citrix Session, host Andy Whiteside, along with guest Geremy Meyers, dives into the transformative integration of Chrome Enterprise Premium into the Citrix platform. This episode explores how Citrix is enhancing browser management and security for enterprise environments, making it easier than ever for businesses to handle web and SaaS applications securely. Geremy, who oversees account technology specialists in the US, shares insights on the strategic partnership between Citrix and Google and the significant benefits it brings, such as improved malware detection, data loss prevention, and policy control within the Chrome browser. Tune in to learn how Citrix's latest move with Google can streamline operations and bolster security for companies leveraging Chrome Enterprise.
Michael F. Schein ghostwrites books that make business leaders, executives, and entrepreneurs famous in their fields. He is the founder of the marketing and consulting company MicroFame Media, and some of his clients have included Lockton, eBay, Magento, the University of Pennsylvania, the United Methodist Publishing House, LinkedIn, and Citrix, to name a few. His writing has appeared in Fortune, Forbes, Inc., Kitces, Business Insider, Psychology Today, and the Huffington Post, and he is a speaker for international audiences, spanning from the northeastern United States to the southeastern coast of China. His book, "The Hype Handbook: 12 Indispensable Success Secrets From the World's Greatest Propagandists, Self-Promoters, Cult Leaders, Mischief Makers, and Boundary Breakers," published by McGraw Hill, is available wherever books are sold.In today's episode of Smashing the Plateau, you will learn how to harness the power of strategic marketing and ghostwriting to become a recognized thought leader.Michael and I discuss:Michael's journey from copywriting to marketing consultancy [02:18]The concept of becoming a "micro celebrity" [06:10]The importance of having a book to establish expertise [07:00]Overcoming the fallacy of scale in business [08:12]The impact of community on professional success [16:34]How to balance intuition and external advice [18:00]Michael's insights on thinking like a scientist to find your niche [21:35]Learn more about Michael at https://microfamemedia.com and https://michaelfschein.com.Contact Michael directly at:- Email: mfs@microfamemedia.com- Phone: (917) 273-9885Thank you to our sponsor:The Smashing the Plateau CommunityGet exclusive access and strategic insights – subscribe now and take the first step towards mastering success!
What does bringing clarity and control to today's fragmented digital work environments take? In this episode, recorded live at IGEL Now & Next 2025, I sit down with Tommy Walker, Partner CTO at Omnissa, to explore the intersection of user experience, security, and operational simplicity in modern enterprise IT. With career-spanning roles at VMware, Citrix, and Cisco, Tommy offers a real-world perspective on navigating complexity while building meaningful solutions that work at scale. This is a conversation grounded in reality. We discuss how organizations can move beyond legacy infrastructure and simplify their digital workspace strategy without overwhelming users or IT teams. Tommy shares how Omnissa is helping enterprises shift from scattered tools and outdated workflows to unified, AI-informed platforms that boost both productivity and resilience. We also unpack the practical steps for tackling challenges like technical debt, the Windows 10 end-of-life transition, and rising pressure on IT to deliver more with fewer resources. Throughout the discussion, Tommy emphasizes the importance of partnerships—not just between vendors, but within the entire IT ecosystem—to deliver outcomes that matter. And yes, there's also room for a few lighter moments involving drones, endpoint telemetry, and the occasional geek-out over infrastructure design. But at the core of this conversation is a clear message: modern IT is about enabling users without compromising security and simplifying operations without losing flexibility. If you're rethinking your endpoint strategy, evaluating your hybrid work approach, or just trying to bring a little more order to the chaos, this episode will leave you with practical insights and maybe even a few new ideas for your roadmap. Are you ready to build a digital workspace strategy that actually works? Let's get into it.
Welcome to Episode 398 of the Microsoft Cloud IT Pro Podcast. In this episode Ben meets up with Harm Veenstra at the annual Microsoft MVP Summit. They chat a bit about Harm experience as an MVP and his path to becoming an MVP. Then the move into a few technologies near and dear to Harm, PowerShell and Microsoft Intune. They start off talking about some of the ways Harm uses PowerShell and some of his favorite scripts. They talk about how he uses PowerShell with Intune, in particular using it with remediation scripts. Harm Veenstra Harm started working at 18, from a ServiceDesk employee to a workspace and system engineer at a large insurance firm in the Netherlands. 1996, those were the days! After working there for almost 11 years, Harm had different system engineer jobs and learned much about Citrix, Cisco, VMWare, storage, and Microsoft. Currently, He's employed at NEXXT (https://www.nexxt.one) as a Consultant, mainly in Endpoint Management, but He does anything Microsoft
Entrepreneurship is a thrilling but demanding journey—how do you stay mentally and physically healthy while building a company? In this episode of Healthy Mind, Healthy Life, host Avik Chakraborty sits down with Jason Vego, CEO and co-founder of BEVZ, a software platform for convenience stores that has expanded to over 1,000 locations across the U.S. and raised over $5 million in venture capital. Jason shares his honest experiences of managing mental well-being while leading a high-growth startup. From navigating personal challenges like divorce to recognizing signs of burnout, he offers practical strategies for maintaining balance through diet, exercise, meditation, and relationship management. Tune in to learn how small, sustainable habits can help you thrive in both business and life. About Jason Vego Jason is a seasoned entrepreneur with a background in communications and storytelling. Before launching BEVZ, he led global employee communications at Citrix and even started a failed startup—an experience that fueled his growth. His journey highlights the importance of adaptability, prioritization, and emotional intelligence in leadership. Key Takeaways: ✅ The warning signs of burnout and how to prevent it✅ How small wellness habits (like journaling and morning routines) create a big impact✅ The role of food, exercise, and sleep in staying mentally sharp as a founder✅ Maintaining relationships while running a startup—without guilt✅ Why "You are not your company" is the best advice for struggling entrepreneurs Connect with Jason Vego
Health system technology leaders are increasingly confronting a stark reality: legacy on-premises data centers, long considered reliable pillars of IT infrastructure, are reaching the end of their lifecycle. As the costs of virtualization technologies such as VMware and Citrix climb, many CIOs and CTOs are weighing the benefits of transitioning core workloads to the cloud. […] Source: Myriad Factors Making On-Prem Less Sustainable; Cloud the Clear Path, but Execution Requires Preparation and Expertise on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
In this episode, I cover multiple recent service outages, a concern about a recent policy change by Mozilla, the sudden announcement that Skype will be shutdown within weeks plus more! Reference Links: https://www.rorymon.com/blog/skype-to-be-retired-soon-new-win11-upgrade-block-citrix-licensing-service-issue/
Join hosts Bill Sutton, Todd Smith, and Geremy Meyers for episode 175 of the Citrix Session Podcast as they dive into the critical aspects of upgrading to XenServer 8. In this episode, they discuss the impending end-of-life status of Citrix Hypervisor 8.2 cu1, scheduled for June 25th, 2025, highlighting the necessity for users to transition to the newer XenServer 8. The team outlines the enhanced features, including support for Windows 11 with VTPM, integrated PvS accelerator, added support for Nagios and SNMP, and the revolutionary Xen Conversion Manager which eases VM conversions. They also navigate through operational tips, such as leveraging a content delivery network for updates and the benefits of infrastructure as code with Terraform support. Whether you're planning a migration or looking to optimize your Citrix workloads, this episode offers invaluable insights into making the most of XenServer 8's capabilities.
In this episode of the Citrix Session, host Bill Sutton and a panel of experts, including Andy Whiteside, Geremy Meyers, and Todd Smith, delve into the latest enhancements Citrix has made to improve both security and operational efficiency. They discuss the new feature, Session Remote Start, which enables faster logons and boosts productivity by allowing physical security measures like badge scans to initiate and prepare Citrix sessions even before the user reaches their desk.The team explores how this integration not only speeds up the login process but also aligns with Citrix's commitment to enhancing the user experience and administrative visibility. They cover technical aspects, potential use cases, and the implications of API-driven session management for various industries, especially those with high-security needs like healthcare and public sectors.Tune in to learn how Citrix continues to innovate by merging physical security with digital access, aiming to transform how we approach workspace efficiency and user satisfaction.
Overview: In this episode of the SMB Community Podcast, hosts Amy Babinchik and James Kernan discuss winter weather conditions across the Midwest, then transition into tech news, including rumors of a potential acquisition involving Intel. The conversation shifts to insights on compliance for managed service providers (MSPs), particularly around the new CMMC regulations. They also talk about TikTok's current legal challenges and the latest Citrix acquisition. This week's 5 Minutes with a Smart Person features an interview with Brandi Bonds of Next Level Now, who shares her expertise on providing strategic CFO services to MSPs, emphasizing the importance of accurate financials and strategic planning. The show wraps up with discussions on upcoming classes and events aimed at helping IT professionals improve their business skills and stay ahead in the industry. Chapter Markers: 00:00 Introduction and Podcast Overview 00:51 Weather Chat and Personal Updates 03:59 Tech News: Intel Acquisition Rumors 06:43 CMMC Compliance for MSPs 10:58 TikTok's Future and Acquisition Proposals 13:53 Citrix Acquires Unicorn 14:43 MSP Question of the Week: Answering Calls Live vs. Auto Attendant 19:10 Upcoming Classes and Events 24:05 5 Minutes with a Smart Person: Brandi Bonds with NextLevelNow.Net 41:16 Conclusion and Upcoming Events New Book Release: I'm proud to announce the release of my new book, The Anthology of Cybersecurity Experts! This collection brings together 15 of the nation's top minds in cybersecurity, sharing real-world solutions to combat today's most pressing threats. Whether you're an MSP, IT leader, or simply passionate about protecting your data, this book is packed with expert advice to help you stay secure and ahead of the curve. Available now on Amazon! https://a.co/d/f2NKASI Sponsor Memo: Since 2006, Kernan Consulting has been through over 30 transactions in mergers & acquisitions - and just this past year, we have been involved in six (6). If you are interested in either buying, selling, or valuation information, please reach out. There is alot of activity and you can be a part of it. For more information, reach out at kernanconsulting.com
This podcast interview focuses on the entrepreneurial journey to make buying and selling in B2B remarkably easier. My guest is Mark Fershteyn, Founder and CEO of Recapped. Mark is a tech entrepreneur on a mission. He has a passion for building things from scratch. He specifically prefers going from "zero to one" rather than maintaining existing systems, describing himself as someone who enjoys "bushwhacking through the jungle" and forging new trails. His entrepreneurial journey includes diverse experiences: He co-founded Tryhard Games LLC. Led sales at App Academy, a coding bootcamp, and has a remarkable history of taking on challenging situations. At Citrix, he volunteered to manage their worst-performing sales team - one where no one was making quota. Within 6-9 months, he transformed it into a top-three revenue-producing vertical. In Jun 2019, Mark founded Recapped, a customer collaboration platform that helps B2B sellers work more effectively with buyers. Their mission: to solve the "messy middle" of sales and change the way how B2B sales teams collaborate with buyers and close deals. And this inspired me, and hence I invited Mark to my podcast. We explore how he transformed Recapped from a side project into a game-changing deal collaboration platform, achieving a remarkable 44% win rate for customers - far above the industry standard of 15-18%. He reveals counterintuitive insights from his sales process optimization at Citrix and elaborates on his approach to building a remarkable software company. Last but not least, he shares his unusual incentive approach that helped him and his team to significantly grow a high-quality pipeline. Here's one of his quotes I fundamentally believe 90% of your Salesforce data should be client-facing and should be shared with the prospect... if you're not on the same page, get them out of your pipeline and go focus on deals that are actually going to move the needle. During this interview, you will learn four things: Why he would split the focus 50/50 between product and distribution if he would ever start again? How he's increased close rates by deliberately blending in more professional services How 10% of features but 10x the marketing can outperform having more features but less visibility How the science of selling is 80-90% of success, while art is only 10-20% - making the process repeatable matters more than individual talent For more information about the guest from this week: Mark Fershteyn Website: Recapped Subscribe to the Daily SaaS Reflection Get my free, 1 min daily reflection on shaping a B2B SaaS business no one can ignore. Subscribe here Yes, it's actually daily. And yes, people actually stay subscribed (Just see what peer B2B SaaS CEOs say) My promise: It's short. To the point. Inspiring. And valuable. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The Citrix Session, Bill Sutton and guests delve into Citrix's recent strategic acquisitions of Device Trust and Strong Network, examining how these integrate with Citrix's security framework and enhance hybrid work environments. Join Andy Whiteside, Aaron Banner, Todd Smith, and Geremy Meyers as they explore the implications of these new capabilities on zero-trust architecture and secure private access. Discover how Citrix is not just improving security measures but also facilitating app development within its platform to adapt to the evolving needs of modern enterprises. Whether you're a security professional or involved in enterprise IT, this discussion will provide deep insights into how Citrix's latest enhancements can streamline operations and fortify security protocols in your organization.
Join us in episode 173 of the Citrix Session where host Bill Sutton, Director of Modern Workspace at XenTegra, and guest Geremy Meyers, ATS Director at Citrix, delve into Citrix's latest strategic move—the acquisition of Unicon. In this episode, they explore how this acquisition integrates with Citrix's current offerings, particularly focusing on Unicon's thin client operating system and cloud-based management stack. Discover the implications for enhanced security and management in VDI environments and how this aligns with Citrix's goal to simplify access to both cloud and SAS-based apps. Whether you're a tech enthusiast or a professional navigating the Citrix ecosystem, this discussion will provide you with valuable insights into the future of workspace technology.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
In this episode, we explore the efficient storage of honeypot logs in databases, issues with Citrix's Session Recording Agent and Windows Update. Ivanti is having another interesting security event and our SANS.edu graduate student Rich Green talks about his research on Passkeys. Extracting Practical Observations from Impractical Datasets: A SANS Internet Storm Center diary entry discusses strategies for analyzing complex datasets to derive actionable insights. https://isc.sans.edu/diary/Extracting%20Practical%20Observations%20from%20Impractical%20Datasets/31582 Citrix Session Recording Agent Update Issue: Citrix reports that Microsoft's January security update fails or reverts on machines with the 2411 Session Recording Agent installed, providing guidance on addressing this issue. https://support.citrix.com/s/article/CTX692505-microsofts-january-security-update-failsreverts-on-a-machine-with-2411-session-recording-agent?language=en_US Ivanti Endpoint Manager Security Advisory: Ivanti releases a security advisory for Endpoint Manager versions 2024 and 2022 SU6, detailing vulnerabilities and recommended actions. https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US Revolutionizing Enterprise Security: The Exciting Future of Passkeys Beyond Passwords: A SANS.edu research paper explores the shift from traditional passwords to passkeys, highlighting the benefits and challenges of adopting passwordless authentication methods. https://www.sans.edu/cyber-research/revolutionizing-enterprise-security-exciting-future-passkeys-beyond-passwords/
Welcome to Episode 391 of the Microsoft Cloud IT Pro Podcast. In this episode, Scott sits down with Kamal Srinivasan from Parallels to talk how you can think about delivering applications and desktops to your users in post-Citrix world. As the traditional “Citrix” model faces disruption, we explore how remote work, hybrid scenarios, and cloud-based computing are redefining how organizations deliver applications and desktops to end users. Key topics include: The shift away from static, on-prem desktops to dynamic, cloud-based compute. How to optimize app delivery by building on top of Microsoft's Azure Virtual Desktop (AVD) platform. Bridging the gap between legacy systems and cloud-based solutions, enabling businesses to roll out remote desktop solutions like AVD and Parallels RAS gradually while scaling down on-prem infrastructure. The changing role of IT admins in supporting a workforce that operates anywhere, anytime. Listen in and learn how your organization can streamline operations and empower your workforce with flexible, efficient application and desktop delivery. Like what you hear and want to support the show? Check out our membership options. Show Notes Parallels Parallels RAS Parallels RAS Resources Parallels Secure Workspace Enhance your Azure Virtual Desktop experience with Parallels RAS Windows 365 Link Episode 390: Microsoft Ignite 2024: Windows 365 Link About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!
Guest: Dan Streetman, CEO of TaniumA graduate of West Point who served in Iraq combat operations, Tanium CEO Dan Streetman can't help but compare his business career to his military experience. Understanding huge structures and processes is a crucial skill at both Tanium and in the Army, he says, as are the skills for aligning people around a shared mission.“Before you go on an operation, you write a thing called an operations order ... [and] one of the most important things at the operations order is this paragraph called the commander's intent,” he explains, “which describes how you believe the mission is going to be accomplished and why it's important.”“You may end up doing something completely different. But as long as you understand the mission and the commander's intent, the organization can do amazing things.”Chapters:(01:05) - Election Day (02:44) - Ranger School (06:42) - Parenting and business school (09:59) - Military structures (12:27) - Serving in Iraq (15:59) - Back to normal life (21:37) - Working out (24:14) - Quality sleep (26:37) - Non-founder CEOs (31:35) - Getting the job (35:56) - Earning respect (38:49) - TIBCO (43:40) - Redline (46:37) - Going public (53:54) - Time horizons (58:35) - Free AI (01:03:11) - Whar “grit” mans to Dan (01:03:40) - Who Tanium is hiring Mentioned in this episode: Ronald Reagan, Terri Streetman, Ironman Triathlons, Jeff Bezos and Amazon, Stanley McChrystal, Jon Abizaid, Charles Jacoby, Thomas Siebel and C3, Salesforce, Bill McDermott, Carl Eschenbach, Marc Benioff, Garmin, Mark McLaughlin, Thinking in Bets by Annie Duke, World Series of Poker, Amdocs, David and Orion Hindawi, Citrix, Harvard University, Pets.com, Ben Horowitz, Vista Equity Partners, Vivek Ranadivé, Robert Smith, Operation Warp Speed, BreakLine, Bipul Sinha and Rubrik, Mikhail Gorbachev, F. Scott Fitzgerald, OpenAI and ChatGPT, and Google.Links:Connect with DanLinkedInConnect with JoubinTwitterLinkedInEmail: grit@kleinerperkins.com Learn more about Kleiner PerkinsThis episode was edited by Eric Johnson from LightningPod.fm
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exploit attempts for unpatched Citrix vulnerability CVE-2024-8068/CVE-2024-8069 https://isc.sans.edu/diary/Exploit+attempts+for+unpatched+Citrix+vulnerability/31446 https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_US Microsoft Power Pages: Data Exposure Reviewed https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/ Zohocorp ManageEngine ADAudit Plus Vulnerable To SQL Injection Attacks CVE-2024-49574 https://www.manageengine.com/products/active-directory-audit/cve-2024-49574.html
Mitch Warner reveals how we end up sabotaging ourselves and how you can overcome these obstacles to strengthen relationships and your leadership as a whole. — YOU'LL LEARN — 1) How “the box” limits your perspective and opportunities 2) The tell-tale signs self-deception 3) How to make people feel safe to share their perspectives Subscribe or visit AwesomeAtYourJob.com/ep1001 for clickable versions of the links below. — ABOUT MITCH — Mitch Warner is a bestselling author and Arbinger managing partner with a background in healthcare and organizational turnaround. Mitch is the co-author of Arbinger's latest bestseller, The Outward Mindset. He writes frequently on the practical effects of mindset at the individual and organizational levels as well as the role of leadership in transforming organizational culture and results. He is an expert on mindset and culture change, leadership, strategy, performance management, organizational turnaround, and conflict resolution.Mitch is a sought-after speaker to organizations across a range of industries, bringing his practical experience to bear for leaders of corporations, governments, and organizations across the globe. Specific clients include NASA, Citrix, Aflac, the U.S. Army and Air Force, the Treasury Executive Institute, and Intermountain Healthcare. Mitch carries his first-hand perspective as a proven leader into his speeches and facilitation, dynamically bringing Arbinger's concepts and tools to life through his powerful stories and hands-on experience. His audiences leave inspired to improve and equipped with a practical roadmap to effect immediate change.• Book: Leadership and Self-Deception, Fourth Edition: The Secret to Transforming Relationships and Unleashing Results by The Arbinger Institute • Website: Arbinger.com — RESOURCES MENTIONED IN THE SHOW — • Book: Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration by Ed Catmull and Amy Wallace • Book: Insanely Simple: The Obsession That Drives Apple's Success by Ken Segall — THANK YOU SPONSORS! — • Jenni Kayne. Use the code AWESOME15 to get 15% off your order!• LinkedIn Jobs. Post your job for free at LinkedIn.com/BeAwesomeSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.