• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Log4j, Older Vulnerabilities, CISA KEV

Expect ‘Headline-grabbing’ Log4j Attacks in 2023

January 4, 2023 Zachary Comeau Leave a Comment

Organizations should expect to see continued cyberattacks leveraging the Log4Shell vulnerability in 2023, cybersecurity company GreyNoise Intelligence says in a new report. The Washington, D.C.-based internet scanning traffic analysis firm’s recently released report, the 2022 Mass Exploitation Report, dives deep into the most significant threat detection events of the past year, including touching on CISA’s […]

Read More

Top IT stories 2022

Our Top IT Stories From 2022

December 29, 2022 Zachary Comeau Leave a Comment

2022 was a very busy year for IT professionals as they grappled with new trends, technologies, tools, workplace models, cyberattacks and more while they helped their organization remain productive and secure. We looked back at our coverage to find common trends in our content to bring you our top 10 stories from this past year.  […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

This Guide Can Help Small Businesses Secure Their Cloud Environments

December 29, 2022 Zachary Comeau Leave a Comment

For small businesses, securing IT systems can be a challenge. From finding qualified IT talent and then paying for their salary and security tools, cybersecurity can be costly for a small business. Hackers know this, and this makes small businesses a prime target for cyberattacks. With more and more small businesses leveraging the easy-to-deploy cloud […]

Read More

employee tracking, Hybrid Work Productivity, remote work productivity

Why Trust, Not Employee Tracking Software, Is the Answer to Productivity Paranoia

December 28, 2022 Zachary Comeau Leave a Comment

The COVID-19 pandemic gave birth to the remote and hybrid work trend that many organizations have adopted and built into their workplace culture, with more flexibility over where exactly they do their work given to employees–provided, of course, that the work is completed. With employees now out of sight of their coworkers and supervisors, the […]

Read More

Title Slide: Utelogy achieves SOC 2 Type II standards in Data Security

Utelogy Attains SOC 2 Type II Standards in Data Security

December 21, 2022 Alyssa Borelli Leave a Comment

Utelogy Corp., the Los Angeles-based provider of management, monitoring and analytics software for connected workspaces, recently completed its Service Organization Control (SOC) 2 Type II certification. Conducted by Armanino, the audit affirms that Utelogy’s information security practices, policies, procedures and operations meet the SOC 2 standards for security. Armanino is a top 25 accounting and […]

Read More

SASE, SASE approaches, SASE implementation

Axonius Updates SaaS Management Offering

December 20, 2022 TD Staff Leave a Comment

Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]

Read More

The executive hands prevent the employee from receiving and opening a spam mail, the concept of information security in companies, data protection on the internet

Phishing Scams: 5 Tips on Training Employees

December 19, 2022 Roy Zur Leave a Comment

Phishing attacks have been around for just about as long as email, yet employees still regularly fall for them. According to the U.S. Federal Bureau of Investigation, roughly 90% of data breaches occur on account of phishing and those attacks have increased approximately 400% since the start of the COVID-19 pandemic. Assessing and reacting to […]

Read More

Microsoft Apple macOS bug

Apple Fixes Actively Exploited Bug in WebKit Impacting Wide Range of Devices

December 15, 2022 Zachary Comeau Leave a Comment

Apple this week has patched a wide range of security fixes, including one in WebKit that is being actively exploited and impacting all supported iPhones. The security update, included in iOS 16.1.2, macOS Ventura, macOS Big Sur, macOS Monterey, Apple TV, fixes a bug that would allow arbitrary code execution if maliciously crafted web content […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Proofpoint to Acquire ITDR Company Illusive

December 13, 2022 Alyssa Borelli Leave a Comment

Proofpoint Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company has entered into a definitive agreement to acquire Illusive, the Identity Threat Detection and Response (ITDR) company​. The acquisition is expected to close by January 2023, subject to customary closing conditions. The cost of the acquisition was not disclosed. With the acquisition, Proofpoint says it will […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New Tool To Help Automate Vulnerability Remediation

December 12, 2022 Zachary Comeau Leave a Comment

Palo Alto Networks is releasing Xpanse Active Attack Surface Management, a new tool built into the cybersecurity solution provider’s Cortex platform designed to help security teams actively find and fix known and unknown internet-connected risks. According to the Santa Clara, Calif.-based company, Xpanse Active Attack Surface management (Xpanse Active ASM) is designed with automation to […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.