In May of this year 2018 the General Data Protection Regulation (GDPR) will enter into force, which will be mandatory in all countries of the European Union. This new regulation will affect all companies, located in Europe or doing business in the EU, that handle personal information of any kind. Failure to comply with these regulations will be penalized with fines reaching up to 20 million euros.
Since the beginning of the year, the alarms about the existence and effects of Meltdown and Spectre have been raised, news related to these attacks do not stop popping out. The latest information suggests that the patches for the fourth and fifth generation Intel Haswell and Broadwell processors may cause unexpected reboots in their system. Amazon Web Services (AWS) neither has had much luck with its patches against these security flaws since they are affecting the performance of their cloud servers.
The company Snyk has released a report that analyzes The State of Open Source Security focusing on three main areas: the Open Source panorama, the life cycle of a vulnerability detected in Open Source and the future of this type of software.
In the world of VDI, balance is also essential when it comes to user experience and security. Unfortunately for VDI administrators, there is no all-powerful chosen one who can swoop in and deliver the balance they need. One of the measures for securing your VDI is to allocate enough hardware resources to ensure virtual desktops perform at least as well as physical desktops do.
Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network. As IoT devices they are susceptible to the growing threat of DDoS attacks – left unsecured they are an open door to the corporate network.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.