• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
SolarWinds Virtual Agent AI

SolarWinds Announces New Secure Software Development Process

June 22, 2022 Zachary Comeau Leave a Comment

IT management company SolarWinds, more than a year and-a-half after it was discovered that popular software was compromised via a malicious update, has unveiled a new secure software development process in a move to make the company a model for enterprise software security. SolarWinds’ “Next-Generation Build System” includes both new software development practices and technology […]

Read More

password manager, Hitachi ID, HYPR, Bravura OneAuth, passwordless

Best Practices for Password Security

June 17, 2022 Tim Singleton Leave a Comment

We all know the password mantra: Make it long, strong and unique. Also, include upper-case letters, lower-case letters, numbers and special characters. And don’t forget to use different passwords everywhere — at least eight characters, but preferably more. Plus, remember to change them frequently. Phew! And as if all that weren’t enough, here’s another: Never […]

Read More

Nametage customer identification solution

Nametag Launches Identification Solution for Customer Support Teams

June 15, 2022 TD Staff Leave a Comment

ID-based authentication company Nametag has launched a new identification solution that utilizes a no code, out-of-the-box portal for identity verification for customer support teams. Anyone who has ever called customer support for help with their account knows it can be a frustrating experience that doesn’t feel secure. Trusting one’s identity online or over the phone […]

Read More

healthcare ransom payment cybersecurity

Foundational Tips for Fighting Healthcare’s Top Cyberthreats

June 9, 2022 Tom Neclerio Leave a Comment

In 2021 alone, the healthcare industry saw a 123% increase in ransomware attacks and sensitive data breaches likely as a result of the pandemic. It is of no surprise that cyberattacks have only continued to escalate and intensify across healthcare institutions – further destabilizing the medical field, adding to concerns among patients, and creating more […]

Read More

Cisco Live 2023

Cisco Unveils New Security Cloud Strategy

June 7, 2022 TD Staff Leave a Comment

Cisco unveiled its plan for a global, cloud-delivered, integrated platform that secures and connects organizations of any shape and size at today’s RSA Conference. Cisco Security Cloud is designed to be the “industry’s most open platform, protecting the integrity of the entire IT ecosystem—without public cloud lock-in,” says Cisco. Cisco Security Cloud is expected provide […]

Read More

CISO, Log4shell, Log4j

Should Log4Shell Still Keep CISOs Up at Night?

June 7, 2022 Dan Murphy Leave a Comment

In December 2021, the Apache Software Foundation disclosed that the popular Log4j framework contained a critical vulnerability that allowed remote code execution (RCE).  It caused a security earthquake, keeping many CISOs up at night. The aftershocks are still felt. The vulnerability, known as Log4Shell, was extremely easy to exploit. Put simply, it allowed any malicious […]

Read More

electronic design, SBOM

Static SBOMs vs Dynamic SBOMs

June 6, 2022 Liran Tancman Leave a Comment

Since the federal government mandate calling for the creation of a software bill of materials (SBOM) to avoid the next SolarWinds or Log4j exposures, software providers have been scrambling to figure out how to create SBOMs that are both effective and dynamic, given that software changes over time. Bills of material have long been standard […]

Read More

SnapAttack Mandiant Partnership

SnapAttack and Mandiant Partner to Protect Organizations Against Cyber Threats

June 2, 2022 TD Staff Leave a Comment

Threat hunting platform SnapAttack and Mandiant have announced a strategic partnership to integrate Mandiant’s adversary intelligence along with SnapAttack’s adversary emulation and no-code threat detection capabilities.  The partnership will allow customers to drive modernization and actionable data in their security operations. “The proliferation and scale of cyber threats worldwide has never been higher,” said Marshall […]

Read More

Microsoft Cloud for Sustainability

Three Tech Giants Expand Sustainability Partnership

June 2, 2022 Zachary Comeau Leave a Comment

In conjunction with the general availability launch of Microsoft Cloud for Sustainability, Accenture, Microsoft and Avanade announced an expansion of their partnership to help organizations tackle climate change and other environmental, social and governance (ESG) challenges. The three companies aim to deliver solutions to help organizations transform operations products, services and value chains to help […]

Read More

NSA Programming Languages

Marsh & Microsoft Report: IT Pros, Leaders Must Align More on Cyber Risk

June 1, 2022 TD Staff Leave a Comment

A report by insurance broker Marsh and tech giant Microsoft looks at how cyber risk is viewed by various functions and leaders within organizations, specifically cybersecurity and IT, risk management and insurance, finance and executive leadership. While all functions have common interests around cyber risks, the report finds that they often act independently. All departments […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.