Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Citrix Podcasts

show episodes
 
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
  continue reading
 
Artwork
 
Combining two technologies can often be cumbersome. Every other Monday, join Neil C Hughes, a tech columnist and #1 best-selling author on Amazon, as he interviews technology companies on the latest tech they’ve developed and their integration with Citrix. If you are a tech enthusiast looking for how Citrix technology alliances have solved industry challenges and empowered people to unlock their full potential, this podcast is for you.
  continue reading
 
Artwork

1
The Upload w/ ControlUp

Eugenia Schipelliti | Jeff Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Take control of your digital workspace environment end-to-end AND make your end-users happy with their experience. Join Eugenia Schipelliti and Jeff Johnson as they interview industry leaders, customers, and tech gurus on how ControlUp is the simplest, most cost-effective way to observe, analyze and optimize your employees’ digital experience. They’ll help you understand the technology, trends in the industry, and best practices with digital workspaces so you can understand how to keep your ...
  continue reading
 
Artwork

1
ControlUp Community Radio

ControlUp Community

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ControlUp Community Radio: The Premier Podcast for IT Insights and Innovations. Join your host, Douglas Brown, as he engages with the leading minds in the realm of End-User Computing (EUC), Digital Employee Experience (DEX), and the broader desktop computing landscape. Delve into candid conversations that unveil the pulse of the technology world—without any preset script. Our guests, ranging from industry pioneers to key players, share their invaluable experiences, providing you with actiona ...
  continue reading
 
Stop living in the past. With technology changing, it's important to be aware of the latest features, functionality, and best practices. Join Steve Beals as he interviews the tech experts that helped design, build and deploy the latest Citrix technology. They'll help you understand how the magic works so you can impress others with your Citrix knowledge and expertise. So subscribe, tune in, and geek out with us on The Click-Down. Follow Steve Beals on X (formally Twitter) @SRBeals
  continue reading
 
Artwork

1
XenTegra - AVD Monthly + Nerdio

XenTegra / Andy Whiteside / Pete Downing

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Artwork

1
IGEL Weekly

XenTegra

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
This weekly podcast focusses in on the incredible power of Citrix Podio, and the impact it can have on your business when it is implemented properly. We focus in on three key types of episodes: Partner Profiles - In these episodes we speak with different Podio Partners to learn first-hand about their business, their journey with Podio, some of the key systems they have designed, and their key hints and tricks they can't live without. Client Stories - In these episodes we'll be interviewing d ...
  continue reading
 
Artwork

1
Morgan D Rees

Morgan D. Rees

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A proven professional with international and domestic marketing, branding and sales experience in the consumer and business-to-business industries. Built a reputation on consistently driving the profitable growth and market success by focusing on market share, brand awareness and building the business bottom line for such renowned brands as Citrix Online, Philips Electronics, Norelco, Marantz, Magnavox, Netgear and Honeywell. Honors graduate and faculty member of Florida International Univer ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
NetScaler application delivery and security solutions are designed to ensure that business-critical applications perform well and remain secure. Centered around a comprehensive application delivery controller and advanced WAN, these solutions help companies succeed by ensuring an optimal user experience.
  continue reading
 
Artwork

1
The Current Status

Hosted by @ExchangeGoddess, @24x7ITconnect, @vmiss33

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Phoummala Schmitt, Theresa Miller and Melissa Palmer as they discuss technology and IT trends in a way that will not have you hitting the snooze button.
  continue reading
 
Artwork
 
Innovation by design is a pilot project of members of DTX and the Design@Business Community in collaboration with the Center for Business Innovation at Chalmers University of Technology to explore podcasts as a way to share community knowledge and gain research insights.
  continue reading
 
The Art of the Pivot brings you an executive perspective on the trends, challenges and triumphs experienced by today’s most transformative business leaders. Our conversations will take listeners into the mind of decision-makers at their most critical - or shall we say, pivotal - moments. Subscribe today and learn business transformation lessons you won’t hear anywhere else. Learn more about Signavio here: https://bit.ly/2IMD7Am
  continue reading
 
In the Wheels Up Travel Podcast, Rick Versace Jr. reaches out to Travel Professionals across different industries to learn about the people behind the scenes in the travel industry. Listen as Rick interviews Corporate Travel Managers, Meetings and Event Planners, Road Warriors, and Business Owners and Executives to learn about how they have been successful in the travel industry so far and hear a little about where the travel industry will be going! Support this podcast: https://podcasters.s ...
  continue reading
 
Artwork
 
"Fireside MSP" is a warm, engaging podcast brought to you by the Managed Service experts at XenTegra, where technology meets conversation around the virtual fireside. Each episode dives deep into the world of managed services, exploring the latest trends, solutions, and innovations that are shaping the future of technology. Hosted by seasoned professionals from XenTegra and featuring occasional guest appearances from our industry partners, "Fireside MSP" aims to demystify the complex world o ...
  continue reading
 
Loading …
show series
 
In Episode 184 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to explore the newly enhanced integration between Citrix DaaS and Amazon WorkSpaces Core Managed Instances. The team dives into what's new in this “version 2” release, how it enables flexible, cost-effective VDI deployment, and why it’s a…
  continue reading
 
Critical Alert: CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)! Organizations relying on Citrix NetScaler ADC and Gateway for secure remote access must act immediately. This newly uncovered vulnerability allows unauthenticated attackers to leak sensitive memory—including session tokens—by sending malformed authentication r…
  continue reading
 
In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet’s FortiWeb also fa…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2 Scattered Spider Hits Aviation From ClickFix to FileFix Ransomware Threats from Q2 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love covers several significant cybersecurity incidents. Hackers disrupt all Aeroflot flights, causing massive delays in Russia. The women-only dating app 'Tea' faces a second serious data leak, exposing 1.1 million private messages. A game on Steam named 'Camia' is found to contain three types of …
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers several key incidents impacting the cybersecurity landscape. Amazon's generative AI coding assistant 'Q' was compromised by a hacker who injected data-wiping code into the tool's GitHub repository. Scattered Spider, a notorious cybercrime group, continues its malware attacks on VMwar…
  continue reading
 
This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering. In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, expl…
  continue reading
 
CYFIRMA research provides an analysis of a newly identified Remote Access Trojan, EdskManager RAT, which exhibits stealthy infection mechanisms and covert control using HVNC. Key Capabilities: · Multi-stage infection using signed binaries and encrypted config · HVNC-based hidden window interaction · Browser extension profiling (Chrome, Edge, Brave)…
  continue reading
 
In Episode 183 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to break down how IT leaders can make smarter decisions when rolling out Windows 365. They explore the growing importance of deep visibility, flexible deployment models, and persona-based strategies to support modern hybrid environments. …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34) LameHug AI-Powered Malware (5:55) UK Bans Ransomware Payments (9:44) AI Tactics Behind the Latest Cyber Threats (14:11) Kim B…
  continue reading
 
In Episode 182 of The Citrix Session, host Bill Sutton and Citrix’s Todd Smith dive into the expanded capabilities of XenServer 8.4, Citrix’s enterprise-grade hypervisor. No longer just for Citrix workloads, XenServer is now fully supported for all workloads under both Citrix Platform Licensing and UHMC—making it a strong contender for organization…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses several pressing cybersecurity issues. First, popular NPM Linter packages were hijacked via phishing to spread malware, affecting millions of downloads. Concurrently, Ukrainian CERT uncovers new phishing campaigns tied to APT28 using large language models for command and control. …
  continue reading
 
The Cybersecurity Today episode revisits a discussion on the risks and implications of AI hosted by Jim Love, with guests Marcel Gagné and John Pinard. They discuss the 'dark side of AI,' covering topics like AI misbehavior, the misuse of AI as a tool, and the importance of data protection in production environments. The conversation delves into wh…
  continue reading
 
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
  continue reading
 
In today's episode, host Jim Love covers recent cybersecurity threats, including malware hidden in DNS records, a custom backdoor targeting SonicWall SMA devices, the US military assuming a network compromise after Chinese hackers targeted VPNs and email servers, and a $27 million theft from the BigONE crypto exchange. The show highlights how attac…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
  continue reading
 
Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
  continue reading
 
In this episode hosted by Jim Love, 'Cybersecurity Today' celebrates its recognition as number 10 on the Feed Spot list of Canadian News Podcasts and approaches a milestone of 10 million downloads. Key topics include new research identifying Nvidia GPUs as vulnerable to Rowhammer style attacks, Microsoft's significant security improvements in Micro…
  continue reading
 
In Episode 181 of The Citrix Session, hosts Bill Sutton and Todd Smith dive into the key takeaways from the blog “What’s New and Next with Citrix: Q&A from our May 2025 Webinar.” From release cadence updates and licensing clarity to enhanced integration with Windows 365 and Nutanix, this episode is packed with forward-looking insights for Citrix ad…
  continue reading
 
New Threat Model: Zero-Click Compromise via File Rendering Automation RenderShock introduces a powerful new attack framework that leverages trusted file previewing, indexing, and sync mechanisms to trigger payloads — without exploits, macros, or even opening the file. Key Highlights: Zero-click execution using passive system features. Payloads deli…
  continue reading
 
CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
  continue reading
 
In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses major updates on the recent cyber attack on Marks and Spencer, revealing new details and arrests. The breach involved sophisticated social engineering that infiltrated the company's network through an IT service provider, leading to 150GB of stolen data. Love then covers a massive insi…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
  continue reading
 
CYFIRMA uncovers a sophisticated phishing campaign by APT36 (Transparent Tribe) leveraging Linux-specific malware on BOSS Linux systems (widely used by Indian government agencies). Attackers use malicious .desktop files to deploy stealthy ELF binaries while distracting users with fake PowerPoint files. Stay vigilant and safeguard critical infrastru…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love engages in a comprehensive conversation with Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They delve into the stark difference between perceived and actual preparedness for cybersecurity in the face of growing AI adoption. The discussion spans topics such as the rol…
  continue reading
 
In this episode of The Upload with ControlUp, Jeff and Eugenia dive into the world of Amazon Workspaces—breaking down the different types (personal, pooled, core, and AppStream), and how ControlUp enhances visibility, manageability, and user experience across them. From shared responsibility models to peripheral frustrations and endpoint diagnostic…
  continue reading
 
12-Day War update: Israel and Iran agree to a fragile ceasefire after America's bombing run on Tehran's nuclear facilities. Link to the Research Report: https://www.cyfirma.com/research/12-day-war-update/ #OperationRisingLion #MidnightHammer #IsraelIran #Geopolitics #CYFIRMAResearch #ThreatIntelligence #cybersecurity #ETLM #currentaffairs #MiddleEa…
  continue reading
 
Tune in to Episode #19 of ControlUp Community Radio, where host Douglas Brown interviews Beau Dolinsky, Vice President of Customer Experience at ControlUp. Beau shares insights from his impressive career, including roles at Citrix and Zoom, and discusses his passion for creating exceptional experiences. Beau emphasizes the value of a "customer-obse…
  continue reading
 
In today's episode of Cybersecurity Today, hosted by David Shipley, a report from the US Department of Justice unveils how criminal organizations use Ubiquitous Technical Surveillance (UTS) to track and kill FBI informants. Hawaiian Airlines experiences a cyber attack, potentially involving ransomware. The Supreme Court upholds Texas's age verifica…
  continue reading
 
Managing virtual desktops doesn’t have to be hard. In Episode 180 of The Citrix Session, Bill Sutton is joined by Citrix’s Todd Smith and Geremy Meyers—and special guest Phil Sellers from XenTegra—to break down the latest innovations from the Citrix + Nutanix partnership. What’s New & Why It Matters: One Integration Point: Citrix now supports Prism…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love is joined by Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They begin the discussion with a report from Accenture that highlights the gap between the perceived and actual preparedness for cybersecurity as AI becomes more integrated into business operations. Jim and K…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses urgent cybersecurity threats and concerns. Cisco has issued emergency patches for two maximum severity vulnerabilities in its Identity Services Engine (ISE) that could allow complete network takeover; organizations are urged to update immediately. A popular WordPress theme, Motors, h…
  continue reading
 
Odyssey Stealer, a rebranded version of Poseidon Stealer, targets macOS users through the Clickfix technique—tricking victims into copy-pasting malicious scripts into their terminal. With capabilities to steal hardware details, keychains, browser cookies, crypto wallets, and plugins, the stolen data is sent to the stealer's hosted infrastructure. D…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses various pressing issues and trends in the realm of cybersecurity. The episode starts with a revelation from Okta's 2025 Customer Identity Trends report, which highlights the conflicting digital behaviors of Canadians who, despite their fear of identity theft, often reuse passwords acro…
  continue reading
 
As hardware costs climb and Windows 11 migration looms, IT leaders face a tough choice: upgrade or optimize. In Episode 179 of The Citrix Session, Bill Sutton (XenTegra) and Todd Smith (Citrix) unpack a smarter path—repurposing aging hardware with Citrix Elux and Scout. Why Listen: Learn how tariffs and supply chain delays are impacting endpoint st…
  continue reading
 
Cyber Threat Alert: APT36 Targets Indian Defense with a Sophisticated Phishing Campaign! CYFIRMA has uncovered a targeted cyber-espionage operation by APT36 (Transparent Tribe), a Pakistan-based threat actor. This group is exploiting phishing emails embedded with malicious PDFs mimicking official NIC documents to infiltrate Indian defense systems. …
  continue reading
 
In this episode of Cybersecurity Today, hosted by David Shipley, key cybersecurity incidents and threats are discussed. The Canadian Center for Cybersecurity revealed a breach by Chinese state-sponsored hackers of a Canadian telco, with further threats expected to continue targeting Canadian critical infrastructure. The U.S. braces for potential Ir…
  continue reading
 
In this thought-provoking episode of Project Synapse, host Jim and his friends Marcel Gagne and John Pinard delve into the complexities of artificial intelligence, especially in the context of cybersecurity. The discussion kicks off by revisiting a blog post by Sam Altman about reaching a 'Gentle Singularity' in AI development, where the progress t…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365’s enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain r…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
  continue reading
 
Stay ahead of evolving ransomware threats with CYFIRMA’s May 2025 Ransomware Report. May witnessed a 15.95% spike in ransomware attacks compared to April, with 545 incidents logged globally. New actors like SafePay and SilentRansomGroup rapidly gained ground, while established groups like Qilin deployed advanced loaders like NETXLOADER and SmokeLoa…
  continue reading
 
In this episode, host Jim Love delves into recent cybersecurity threats and breakthroughs. The notorious Scattered Spider hacker group has shifted its focus to US insurance companies after attacking UK retailers earlier this year. Microsoft's urgent security updates address active zero-day vulnerabilities that allow complete system control. Researc…
  continue reading
 
CYFIRMA’s latest research report analyses a stealthy Windows-based malware known as CyberEye, which is posing a significant threat across systems by offering attackers full remote control through a Telegram Bot API. Once executed, it silently harvests browser-stored passwords, cookies, credit card details, Wi-Fi credentials, and session tokens from…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play