• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: colonial pipeline

NSA Programming Languages

How To Protect Your Organization from Cyberattacks Before The Holidays

IT and security pros should take extra steps to protect their organization from cyberattacks this holiday season, White House, CISA urge.

December 19, 2022 Zachary Comeau Leave a Comment

Editor’s note: This article was originally published last year, but the main points are still relevant today as we head into another holiday break. Review these tips and recommendations to keep your organization safe and secure this year.  With the holidays approaching, federal officials are again warning organizations of all sizes to be on the […]

Read More

Spectrum Enterprise, Cisco

How to Implement a Third-Party Cyber Risk Management Program

CyberGRX explains the importance of implementing a TPCRM program and how your organization can get started, particularly when working with a hybrid workforce.

August 24, 2022 Sarah Frazier Leave a Comment

The COVID-19 pandemic introduced swift digital changes that created further security vulnerabilities for a hybrid workforce. Due to the distributed nature of modern work environments, businesses must be on the lookout for ways that cybercriminals can expose new vulnerabilities. In today’s economy, the need to construct a third-party cyber risk management program  (TPCRM) program for […]

Read More

IT Leaders, IT Careers, IT jobs

Why IT and Business Leaders Need to Solve Their Disconnect

Proposed SEC rules require organizations to report cybersecurity data, so companies need to solve the disconnect between IT and leadership.

July 20, 2022 Zachary Comeau Leave a Comment

In March, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules that are designed to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance and incident reporting by publicly traded companies. However, a historic disconnect between IT and business leaders could make them difficult to implement. If adopted, the rules would […]

Read More

employee phishing email cybersecurity warning hacker network

How Employees Can Invite Hackers into Your Network

Employees are mistakenly sending open invitations for hackers to infiltrate company networks in a myriad of ways.

June 13, 2022 Richelle Calicott Leave a Comment

The new working environment has challenges for organizations and employees. According to Gartner, the worldwide information security market is predicted to hit $170.4 billion in 2022. This happens as companies invest heavily into cybersecurity, one of the fastest-rising concerns in the modern workspace. However, smart companies know that most savings will come from employee sensitization. […]

Read More

CIO, CISO cyber attack confidence

Half of Global CISOs Feel Unprepared to Cope with a Cyber Attack

Despite growing confidence in security posture, Proofpoint’s latest report reveals CISOs feel unprepared to cope with a cyber attack.

May 18, 2022 TD Staff Leave a Comment

With the 2020 scramble to enable remote working, many CISOs have now come to terms with new ways of working. Many CISOs feel more in control of their environment: 48% feel that their organization is at risk of suffering a cyber attack within the next 12 months, down from 64% last year, according to Proofpoint’s […]

Read More

CISA Warns of Increased Globalized Threat of Ransomware

Ransomware tactics and techniques are continuing to evolve and place an immediate threat to organizations globally.

February 16, 2022 Alyssa Borelli Leave a Comment

In 2021, 14 of the 16 U.S. critical infrastructure sectors were hit with ransomware, according to the CISA, FBI and NSA in a new report. And it’s not just happening the U.S., Australia’s critical infrastructure entities have been hit, as well as in the U.K. The education sector was one of the top U.K. sectors […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Cybercriminals Are Using Malware To Target Linux-Based Systems

VMware Threat Analysis Unit (TAU) details how cybercriminals are targeting Linux-based systems with ransomware and cryptojacking attacks.

February 9, 2022 TD Staff Leave a Comment

With 90% of multi-cloud environments running on Linux-based systems and current malware countermeasures mostly focused on addressing Windows-based threats, attackers have found a golden opportunity to strike as cybercriminals are increasingly targeting Linux-based operating systems, according to latest research from VMware. The company’s new report, “Exposing Malware in Linux-based Multi-Cloud Environments,” shows ransomware is evolving […]

Read More

Cybercriminals Target Linux-based Systems With Ransomware and Cryptojacking Attacks

February 9, 2022 TechDecisions Staff Leave a Comment

VMware report finds more than half of Cobalt Strike users are using the tool illicitly PALO ALTO, Calif.–(BUSINESS WIRE)–As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving […]

Read More

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

January 31, 2022 TechDecisions Staff Leave a Comment

Key Findings In Q3 2021, the financial sector was the most targeted seeing 22% of ransomware and 37% of APT detections Publicly reported cyber incidents in the financial sector increased 21% compared to Q2 2021 Nearly half of APT activity monitored appears to originate from Russian and Chinese backed groups Cobalt Strike attack suite abused […]

Read More

Semperis Extends Active Directory Protection With Expansion Into Australia and New Zealand

January 18, 2022 TechDecisions Staff Leave a Comment

New team in the region propels Semperis’ global growth of hybrid identity protection solutions and follows recent expansion into APAC HOBOKEN, N.J.–(BUSINESS WIRE)–Semperis, the pioneer of identity-driven cyber resilience for enterprises, today announced that it is expanding its comprehensive Active Directory (AD) protection, mitigation, and recovery solutions to Australia and New Zealand with a Melbourne-based […]

Read More

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.