• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cybersecurity Digital Signage Microsoft Artificial Intelligence ransomware Zoom Unified Communications and Collaboration Education Virtual Reality LED
Cybersecurity Trends

Axonius Updates SaaS Management Offering

December 20, 2022 TD Staff Leave a Comment

Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]

Read More

The executive hands prevent the employee from receiving and opening a spam mail, the concept of information security in companies, data protection on the internet

Phishing Scams: 5 Tips on Training Employees

December 19, 2022 Roy Zur Leave a Comment

Phishing attacks have been around for just about as long as email, yet employees still regularly fall for them. According to the U.S. Federal Bureau of Investigation, roughly 90% of data breaches occur on account of phishing and those attacks have increased approximately 400% since the start of the COVID-19 pandemic. Assessing and reacting to […]

Read More

Microsoft Apple macOS bug

Apple Fixes Actively Exploited Bug in WebKit Impacting Wide Range of Devices

December 15, 2022 Zachary Comeau Leave a Comment

Apple this week has patched a wide range of security fixes, including one in WebKit that is being actively exploited and impacting all supported iPhones. The security update, included in iOS 16.1.2, macOS Ventura, macOS Big Sur, macOS Monterey, Apple TV, fixes a bug that would allow arbitrary code execution if maliciously crafted web content […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Proofpoint to Acquire ITDR Company Illusive

December 13, 2022 Alyssa Borelli Leave a Comment

Proofpoint Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company has entered into a definitive agreement to acquire Illusive, the Identity Threat Detection and Response (ITDR) company​. The acquisition is expected to close by January 2023, subject to customary closing conditions. The cost of the acquisition was not disclosed. With the acquisition, Proofpoint says it will […]

Read More

Palo Alto Networks Cortex Active ASM, Google Cloud

Palo Alto Networks Launches New Tool To Help Automate Vulnerability Remediation

December 12, 2022 Zachary Comeau Leave a Comment

Palo Alto Networks is releasing Xpanse Active Attack Surface Management, a new tool built into the cybersecurity solution provider’s Cortex platform designed to help security teams actively find and fix known and unknown internet-connected risks. According to the Santa Clara, Calif.-based company, Xpanse Active Attack Surface management (Xpanse Active ASM) is designed with automation to […]

Read More

Log4j, Log4Shell, GreyNoise

Software Inefficiencies are Costing U.S. Economy Trillions, Study Says

December 6, 2022 Zachary Comeau Leave a Comment

Software quality issues such as vulnerabilities, software supply chain problems and technical debt could be costing the U.S. economy trillions, according to a new report from electronic design automation solutions and services firm Synopsys. The Mountain View, Calif. company’s report, “The Cost of Poor Software Quality in the US,” finds that software quality issues may […]

Read More

AWS Verified Access

AWS Launches Verified Access for VPN-less Secure Remote Access

December 1, 2022 Zachary Comeau Leave a Comment

Amazon Web Services (AWS) is launching the preview of AWS Verified Access, a new secure connectivity service designed to allow employees to enable local or remote secure access for corporate applications without a VPN. The company says Verified Access is built using the AWS Zero Trust Security principles and leverages multiple security inputs to grant […]

Read More

1Password Browser Extension

1Password Releases ‘Sign in With’ Browser Extension

December 1, 2022 Zachary Comeau Leave a Comment

Password management provider 1Password is releasing a new browser extension feature that allows users to automatically save, store and autofill logins with third-party provider credentials in 1Password and bypass the need for unique usernames and passwords. According to the Toronto-based company, users can use third-party provider credentials from Google, Apple, Facebook, Twitter, Microsoft, Okta and […]

Read More

NordVPN Threat Protection

NordVPN Expands Meshnet Functionalities

November 30, 2022 Alyssa Borelli Leave a Comment

VPN service provider NordVPN has announced extended compatibility of its new Meshnet feature with Android TV and the sideloaded version of MacOS.  Meshnet enables users to connect directly and securely to other devices via encrypted tunnels. Users can also waive internet limitations by routing their internet activities via other devices using their home IP address. […]

Read More

Cloud Mistakes, Gartner

Avoid These Cloud Computing Mistakes

November 21, 2022 Zachary Comeau Leave a Comment

Cloud computing is quickly becoming a critical necessity in the modern digital era, but organizations and their IT leaders are not always migrating successfully, according to Gartner. In fact, the IT analyst firm says organizations are making several critical mistakes when building out their cloud strategy and aren’t using the business strategy to drive their […]

Read More

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Interim pages omitted …
  • Go to page 132
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.