• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Professional ChromeOS Administrator certification

Google Adds Security Integrations in Chrome; Cloud Enterprise Connectors Framework

May 27, 2022 TD Staff Leave a Comment

To help IT teams gain insights about potential security threats and events from Chrome, Google is launching the Chrome Enterprise Connectors Framework, a new set of plug-and-play integrations with security solution providers, such as Splunk, Palo Alto Networks and CrowdStrike. Google says the Chrome Enterprise Connectors Framework will help protect users when they navigate to […]

Read More

Email Attacks

Business Email Compromise Attacks Rise More than 53% Year Over Year

May 26, 2022 TD Staff Leave a Comment

Email-based business workflows are the heart of how every organization operates and the shift to remote work has made business workflows more vulnerable to new forms of email-based attacks, financial fraud and credential theft, according to Armorblox. In its annual Email Security Threat Report, the Sunnyside-Calif.,-based cloud security provider reveals 75% of business email compromise […]

Read More

Microsoft Security RSA Conference

Microsoft Launches Public Preview of Access Reviews for Inactive Azure AD Users

May 26, 2022 Zachary Comeau Leave a Comment

Microsoft has released the public preview of access reviews for inactive users as part of Azure Active Directory (AD) Governance for organizations can take action to remove inactive accounts that could be leading to security risks. The feature is designed to help organizations deactivate accounts from former employees or contractors whose assignments have ended by […]

Read More

VMware EXSi security

Ransomware Continues to Disrupt Operational Technology Environments

May 25, 2022 TD Staff Leave a Comment

Ransomware will continue to disrupt operational technology (OT) environments amid the Russian invasion of Ukraine, according to the latest research from industrial cybersecurity firm Dragos. Researchers analyzed ransomware variants targeting industrial organizations worldwide and tracked ransomware information via public reports, and information uploaded or appearing on dark web resources. Dragos’ findings suggest even though the […]

Read More

1Password Browser Extension

The Most Common Password Used Amongst CEOs

May 25, 2022 TD Staff Leave a Comment

The tech industry is one of the most breached sectors, according to the latest study by NordPass. The findings suggest high-level executives worldwide are still practicing poor password hygiene, as the most popular password remains “123456.” NordPass, in partnership with independent researchers analyzing cyber incidents, compiled a list of top passwords used by top-level executives. […]

Read More

Microsoft Intelligent Data Paltform

Microsoft Announces Intelligent Data Platform For Database Integration

May 24, 2022 Zachary Comeau Leave a Comment

Microsoft is holding its annual developer conference, Build, this week, and the company has already made dozens of announcements, including the new Microsoft Intelligent Data Platform that the company says fully integrates databases, analytics and governance and helps break down silos that exist between databases and analytics products. According to the company, the platform is […]

Read More

Data, Hitachi Data Reliability Engineering, DRE Content from Our Sponsor

Why Data and Analytics Are Critical in the Digital Era

May 24, 2022 Seth Robinson Leave a Comment

A few years ago, it was hard to talk about enterprise technology without quickly running into the phrase “digital transformation.” Today, there’s a new phrase making the rounds: data-driven. Organizations have been more and more focused on data since “Big Data” was a trendy buzzword in the middle of the last decade, and that focus […]

Read More

Google Cybersecurity Certificate

10 Common Cybersecurity Mistakes Your Organization is Making

May 23, 2022 Zachary Comeau Leave a Comment

With more of the world relying on technology to connect and maintain business continuity over the last two years, malicious cyber actors have stepped up their game to exploit weaknesses in organizations’ IT infrastructure and conduct a broad range of attacks against both public and private entities. However, network defenders and IT professionals can stop […]

Read More

Department of Justice Ethical Hackers

DOJ Officially Revises Policy, Will Not Charge Ethical Hackers

May 20, 2022 Zachary Comeau Leave a Comment

The U.S. Department of Justice has officially revised its policy regarding ethical hackers, directing U.S. attorneys to not charge “good faith” security researchers who are accessing systems for testing and investigation purposes that ultimately result in a notice to the network owner of the vulnerability. The Department of Justice’s (DOJ) new policy immediately replaces a […]

Read More

VMware

Patch These Four VMware Vulnerabilities Immediately

May 19, 2022 Zachary Comeau Leave a Comment

Organizations are being urged to patch certain VMware products as threat actors are chaining a series of unpatched vulnerabilities in some of the company’s products to gain full system control, even as patches have been available for several weeks. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), threat actors, likely sophisticated groups, are […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.