• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Alyssa Borelli

google quantum computing

Google Lays Out Quantum Computing Vison

January 7, 2022 Alyssa Borelli Leave a Comment

Google says its Quantum AI team is determined to build an error-corrected quantum computer within the next decade despite it being seen as a highly-experimental area of tech development. According to the company, it’s making progress towards building an error-corrected qubit hardware prototype. It outlines three long-term commitments: Demonstrate that quantum computers can outperform supercomputers […]

Read More

Zoom Rooms User Interface

Zoom Expands Acquires Liminal to Prepare for the Future of Hybrid Events

January 4, 2022 Alyssa Borelli Leave a Comment

Zoom has acquired assets from Liminal, a startup company that offers event production solutions built largely on Zoom’s SDK. Liminal’s solutions will help bridge Zoom with traditional and emerging event control applications and hardware to help theaters, broadcast studios, and other creative organizations address complex technical production needs, and collaborate and create online effectively. Liminal […]

Read More

Girls who Code

Lessons from Girl’s Who Code Reshma Saujani

December 6, 2021 Alyssa Borelli Leave a Comment

In 2012 Reshma Saujani founded the non-profit Girls Who Code after realizing a growing gender gap in entry-level tech jobs, particularly when it comes to women in tech. In 1995, women represented 37% of computer scientists; that figure has now plunged to 24%, according to Girls Who Code. Most girls drop out of computer science […]

Read More

IKEA EMAIL HIJACKING INCIDENT

Ikea Investigates Into Internal Email Hijacking Incident

December 2, 2021 Alyssa Borelli Leave a Comment

Multinational furniture maker Ikea announced it is investigating a cyber incident which took place on its Microsoft Exchange server. Malicious emails were sent around the company appearing to be a genuine “reply all” to an email chain, according to documents shared with BleepingComputer. No customer data was compromised as result of the incident. Other Ikea […]

Read More

honeypot unit 42 insecurely exposed services in public cloud

Threat Actors Find Honeypot of Insecurely Exposed Services Within 24 Hours

November 30, 2021 Alyssa Borelli Leave a Comment

Security researchers from Unit 42, the research arm of cybersecurity firm Palo Alto Networks, set out a honeypot infrastructure of 320 nodes globally to better understand the attacks against exposed services in public clouds, and  80% of the 320 honeypots were compromised within the first 24. According to the company’s report, all honeypots were compromised […]

Read More

Robinhood security breach

Robinhood Data Breach: Hacker Tricked Customer Support Employee By Phone

November 9, 2021 Alyssa Borelli Leave a Comment

Stock trading platform Robinhood announced that certain customer support systems were hacked in early November. The unauthorized party was able to gain access using social engineering through a customer support employee by phone. The hacker was able to obtain access to a list of email addresses of about five million people, and full names of […]

Read More

Phishing Success

SailPoint Survey: Generational Differences Exist Between Corporate Email Use & Cybersecurity

November 4, 2021 Alyssa Borelli Leave a Comment

More than half (59%) of workers are using corporate email for personal use, but Gen Z is the biggest offender at 93%, according to identity security company SailPoint, Trust Issues survey. With work and home increasingly blurring amid the COVID-19 pandemic, Sailpoint set out to determine how users behaviors when conducting these activities could put […]

Read More

Infosec, Cybersecurity Awareness

Check Point Survey: CISOs’ Confidence In Security Dwindles As Cyber Attacks Increase

November 3, 2021 Alyssa Borelli Leave a Comment

CISOs are starting to express dwindling confidence in protecting all attack vectors, according to research by Check Point. Check Point’s global survey of CISOs indicated “CISOs’ confidence in security goes down as the number of cyber attacks, assets to secure, and the number of vendors’ solutions used in their environment increases.” At least 92% of […]

Read More

cryptocurrency NCET

6 Money Laundering Typologies Attributed to Ransomware

October 18, 2021 Alyssa Borelli Leave a Comment

As ransomware continues to be an increasing threat to the US financial sector, businesses, and the public, the U.S. Treasury’s Crimes Enforcement Network (FInCEN) has identified six money laundering typologies related to ransomware payments: 1. Threat Actors Increasing Request Payments in AECs Ransomware-related payments are initially requested in Bitcoin, however threat actors may also ask […]

Read More

DDoS, NETSCOUT Arbor Insight

Microsoft Azure DDoS Attacks Up By 140%

October 15, 2021 Alyssa Borelli Leave a Comment

Every organization with internet-exposed workloads is vulnerable to distributed denial-of-service (DDoS) attacks, especially those who are adopting cloud services in the wake of the pandemic. Bad actors will look for ways to take applications offline. The last week of August, Microsoft observed 2.4 terabits per second (Tbps) of DDoS attacks targeting Azure customers in Europe. […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Interim pages omitted …
  • Page 16
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.