• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Extron VCA 100 with a screenshot of the VCP settings.

Extron’s VCA 100 Offers AV Control For Up to 50 Rooms

March 17, 2022 TD Staff Leave a Comment

Anaheim, Calif-based Extron has introduced the VCA 100 Virtual Control Appliance with integrated virtual control processors (VCPs). This new virtual control system helps organizations deploy, scale and manage their AV systems. It does so by providing the flexibility of hosting AV control resources in a central location, right alongside the already managed resources of the […]

Read More

Russia Ukraine Semiconductors

The Russia-Ukraine Crisis Could Tighten the Squeeze on Semiconductors

March 16, 2022 Zachary Comeau Leave a Comment

When the COVID-19 pandemic hit, many manufacturers planned for a downturn and reduced demand, with semiconductor factories scaling down in anticipation of a larger-than-realized recession. Earlier this year, there were some signs that the shortage would begin to subside this year, but the ongoing crisis between Russia and Ukraine threatens to exacerbate the issue, according […]

Read More

Listen EVERYWHERE kit including the server, headphones, receivers and cables.

Listen Technologies Launches Listen EVERYWHERE Server

March 16, 2022 TD Staff Leave a Comment

Listen Technologies Corporation, the Bluffdale, Utah-based provider of advanced wireless listening solutions, has added to its Listen EVERYWHERE product line a new Listen EVERYWHERE server with Dante onboard. Per the company, the LW-150P-02-D Listen EVERYWHERE two-channel server has a Dante input on the rear panel. This enables easy routing and management of Listen EVERYWHERE audio on […]

Read More

Microsoft Security RSA Conference

Check Out These New Microsoft Certifications in Azure, Cybersecurity, Exchange and Data

March 15, 2022 Zachary Comeau Leave a Comment

Microsoft is set to launch four new certification programs for Azure Enterprise Data, Microsoft Exchange Online, Cybersecurity architecture and others over the next few weeks. The new Microsoft certifications will become available starting at the end of this month and in mid-April, starting with Azure Support Engineer for Connectivity Specialty, an addition to the company’s […]

Read More

Cybersecurity Workforce

Why Women Are Needed To Fill The Cybersecurity Workforce

March 14, 2022 Alyssa Borelli Leave a Comment

In 2021, women represented about 25% of the global cybersecurity workforce, according to Cybersecurity Ventures. With over 2.5 million-plus cybersecurity job openings, women can help fill them, writes Vasu Jakkal, vice president of security, compliance, identity, and management at Microsoft in a blog post. With millions of job openings for cybersecurity, it’s putting a strain […]

Read More

IoT Security

New Microsoft Defender for IoT Capabilities Helps Create Secure-By-Design Devices

March 14, 2022 Zachary Comeau Leave a Comment

Microsoft has released the public preview for a new capability in Microsoft Defender for IoT that gives device builders and solution operators the ability to create secure-by-design, managed IoT devices. This capability comes after Microsoft recently announced Defender for IoT sensor, version 22.1, that features Azure portal to scale large environments and control the security […]

Read More

LastPass Breach, Hack

The Amount Of Passwords End Users Have Is Leading To Poor Security Habits

March 10, 2022 Zachary Comeau Leave a Comment

The IT industry continues to hammer home the idea that identity security and password hygiene are often the first lines of defense when it comes to cyberattacks, yet organizations continue to engage in poor practices and have trouble balancing security requirements and user experiences. Just recently, we have covered several studies from IT companies about […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Study: It Takes Over Three Months For Cybersecurity Teams to Adopt New Skills

March 10, 2022 Zachary Comeau Leave a Comment

With today’s cybersecurity attacks rapidly escalating to never-before-seen proportions and new threats constantly emerging, IT and cybersecurity professionals should be able to quickly pivot and develop the knowledge and skills to defend against these threats. However, a new study suggests that it takes more than three months for that to happen. According to cybersecurity firm […]

Read More

Drata Risk Management

7 Security & Risk Management Trends IT Leaders Should Know

March 9, 2022 TD Staff Leave a Comment

Security and risk management leaders must evolve their strategies to protect their organization’s expanding digital footprint against new and emerging threats in 2022 and beyond, according to Gartner. The research firm has identified seven security and risk management trends leaders should know: Trend #1: Attack Surface Expansion Enterprise attacks are expanding and so are risks […]

Read More

1Password Browser Extension

The Most Common Passwords Used In Brute Force & Spraying Attacks

March 9, 2022 Zachary Comeau Leave a Comment

Despite an increased focus on identity, multifactor authentication and password security, passwords continue to be vulnerable to attack, according to a new report from password security provider Specops Software. According to the study, The 2022 Weak Password Report, 93% of password attacks use passwords with at least eight characters, suggesting that attackers are aware of […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.