• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Collaboration Cloud InfoComm Videoconferencing Education AI UCC Microphones Mass Notification Generative AI
SolarWinds Hybrid Cloud Observability

SolarWinds Launches Hybrid Cloud Observability Solution

April 20, 2022 Zachary Comeau Leave a Comment

IT management software provider SolarWinds is releasing its new Hybrid Cloud Observability platform designed to give organizations the ability to accelerate its digital transformation efforts by providing a comprehensive and unified view of the distributed workforce. According to the company, the Hybrid Cloud Observability platform helps organizations solve the problem many are faced with: an […]

Read More

Microsoft Security RSA Conference

Microsoft Launches Microsoft Purview, A Unified Rebrand of Its Compliance, Security, Governance Offerings

April 19, 2022 Zachary Comeau Leave a Comment

Microsoft is launching Microsoft Purview, a new set of solutions designed to help organizations govern, protect and manage their entire data estate, combining the capabilities of Azure Purview and the Microsoft 365 Compliance portfolio. In a blog post, Microsoft outlines how the events of the last two years has led to a massive increase in […]

Read More

Proofpoint CISO, CISOs cyberattack

Hackers Adapting Despite Improved Detection, Mandiant Says

April 19, 2022 Zachary Comeau Leave a Comment

Although the IT software supply chain and the technologists tasked with using those tools to keep organizations safe from cyberattacks continue to innovate, hackers are also adapting their techniques to target and infiltrate organizations’ IT environments, according to cybersecurity firm Mandiant’s M-Trends report. The company’s M-Trends 2022 report, based on investigational metrics between Oct. 1 […]

Read More

Azure Managed Grafana

Azure Managed Grafana, Integrations In Preview

April 19, 2022 Zachary Comeau Leave a Comment

Microsoft has launched the preview of Azure Managed Grafana, a new managed service that lets customers run the popular open-source analytics visualization tool natively within the Azure cloud platform. According to Microsoft, organizations can use Grafana to bring together logs, traces, metrics and other disparate data from across an organization and visualize all its telemetry […]

Read More

Crestron DM NVX

Crestron Issues DM NVX Platform Firmware Update

April 18, 2022 TD Staff Leave a Comment

Crestron, the Rockleigh, N.J.-based workplace technology provider announced the latest enhancements to its DM NVX AV-over-IP platform. Since its introduction, the DM NVX has evolved with feature-rich firmware updates that consistently deliver a reliable and high-performing solution to customers. Crestron says it continues to adapt existing solutions with frequent upgrades and enhancements. These increase the solutions’ […]

Read More

Atera ESET Integration

How Tarrask Malware Uses Scheduled Tasks for Defense Evasion

April 15, 2022 TD Staff Leave a Comment

The Microsoft Detection and Response Team (DART) in collaboration with the Microsoft Threat Intelligence Center (MSTIC) is warning of a defense evasion malware called Tarrask. The malware creates “hidden” scheduled tasks, and subsequent actions to remove task attributes, to conceal scheduled tasks from traditional means of identification. Microsoft notes the simplicity of the malware technique, […]

Read More

Zero Trust, Leostream, AWS

iboss Launches Policy Manager For Zero Trust Implementation

April 13, 2022 Zachary Comeau Leave a Comment

Zero trust edge cloud security provider iboss has released its new Zero Trust Policy Manager designed to enable organizations of all sizes to implement zero trust policies in their IT environment. The Boston-based company’s Zero Trust Policy Manager (ZTPM) helps organizations implement zero trust in accordance with the new federal guidelines from the National Institute […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Malware Developers Are Targeting These 10 2021 Security Bugs

April 13, 2022 Zachary Comeau Leave a Comment

Security analysts at Skybox Security uncovered a 42% increase in new ransomware programs targeting known vulnerabilities last year, including critical vulnerabilities discovered in Log4j and Exchange Server. The San Jose, Calif. cybersecurity company’s 2022 Vulnerability and Trends Report, released this week, details how quickly hackers capitalize on new security bugs and continue to reduce the […]

Read More

McAfee ransomware attack

Organizations are Under-Prepared to Effectively Mitigate Against the Risks and Impact of Ransomware Attacks

April 13, 2022 TD Staff Leave a Comment

Gaps in readiness are impacting the ability of many organizations to manage and recover from ransomware attacks, according to research by Zerto, a Boston-based cloud data management and protection platform. This gap poses a risk to mitigation strategies presented by widespread skills shortages and over-reliance on internal resources. One of the best protections against a […]

Read More

Fortinet Vulnerability, Fortigate

April 2022 Patch Tuesday: 10 Critical Microsoft Bugs, RCEs and More

April 12, 2022 Zachary Comeau Leave a Comment

IT admins have a lot of patching to do this month as Microsoft has released patches to address nearly 130 security vulnerabilities, including 10 critical bugs and three with a CVSS of 9.8. According to Zero Day Initiative (ZDI), the vulnerability disclosure initiative of cybersecurity firm Trend Micro, this volume of patches has not been […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.