• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
CompTIA logo

CompTIA Adds Data+ Analytics Certification

March 1, 2022 TD Staff Leave a Comment

CompTIA, provider of vendor-neutral skills certifications and education for technology workers, has expanded its credentialing program with the introduction of CompTIA Data+. CompTIA Data+ is a data analytics certification for professionals tasked with developing and promoting data-driven business decision-making. It validates the ability to mine, analyze and interpret data in a clear, consistent way that […]

Read More

Diversity in IT

Increasing Diversity In IT Starts From The Ground Up

March 1, 2022 Zachary Comeau Leave a Comment

At a recent IT industry event, Kenitra Horsley, the deputy chief information officer and director of enterprise systems at Queens University of Charlotte, a seasoned IT expert with more than 20 years of experience in IT management, was asked how she got a technology leadership role. Horsley, a black woman, says she felt “blatantly disrespected” […]

Read More

Malware file types, HP Wolf security

Research Discover Highly Advanced Espionage Malware Linked To China-based Hackers

February 28, 2022 Zachary Comeau Leave a Comment

Symantec, a subsidiary of Broadcom and a member of the U.S. Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative, has uncovered a new malware strain the company calls the most advanced piece of malware ever linked to China-based threat actors. The Symantec Threat Hunter team says it uncovered malware that appears to be used […]

Read More

Microsoft Security RSA Conference

It is Now Easier To Configure, Deploy And Manage macOS Devices In Microsoft Endpoint Manager

February 25, 2022 Zachary Comeau Leave a Comment

IT administrators can now more easily find, configure, deploy and monitor macOS settings in Microsoft Endpoint Manager after Microsoft released support for macOS policies in its settings catalog and added support for new payload settings. Microsoft calls this part of its continued investment in macOS platform management and one that eliminates some manual processes previously […]

Read More

Hybrid Meeting; FBI warns of BEC scams

How to Use Virtual Meeting Platforms Securely

February 25, 2022 TD Staff Leave a Comment

Americans spend an average of two hours and five minutes a week making video calls via online meeting platforms like Zoom, Skype, and Microsoft Teams, according to research by NordVPN. With videoconferencing platforms gaining popularity, cybersecurity experts are warning users about the dangers of being scammed and potentially infected by malware through them. “Since the […]

Read More

Google Cybersecurity Certificate

Cyber Risk Accountability Is Shifting Outside Of IT

February 24, 2022 Zachary Comeau Leave a Comment

Accountability for cybersecurity risk is shifting outside of IT, and the role of the cybersecurity leader needs to evolve, Gartner says in a new report. According to Gartner, security and risk managers are investing more effort into evaluating and influencing the cyberhealth of external parties, employees are making more decisions with cyber risk implications and […]

Read More

Sumsub facial biometric check software

iOS/Mac Users Pass Facial BioMetrics Checks Faster

February 24, 2022 TD Staff Leave a Comment

Facial biometric checks, also know as “face authentication,” are meant to protect businesses from fraud by ensuring that users are truly present during remote verification. Sumsub, an online verification identity service that helps onboard millions of users annually, examined the efficiency of face authentication and found differences in the time needed to complete facial biometric […]

Read More

Barco's Clickshare Conference CX-50 device against a white backdrop.

Magewell Joins Barco’s ClickShare Alliance Program

February 24, 2022 TD Staff Leave a Comment

Magewell, a developer of video interface and IP workflow solutions has joined Barco’s ClickShare Alliance Program. The new partnership will ensure Magewell’s USB Capture Gen 2 HDMI-to-USB and SDI-to-USB capture devices’ compatibility with Barco’s ClickShare Conference wireless conferencing portfolio. Magewell says its plug-and-play USB Capture Gen 2 devices let users easily and reliably bring HDMI or […]

Read More

Microsoft Security RSA Conference

Microsoft Extends Azure AD Identity Protection Into Workload Identities

February 24, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure AD Identity Protection for workload identities that includes purpose-built anomaly detection capabilities for workload identities with user detections to help protect the entire IT environment. According to Microsoft, cloud migrations include software workloads like apps, services or scripts that access cloud resources and have workload identities in […]

Read More

Mass notification system, fire alarm

How Mass Notification is Evolving to Manage Emergencies

February 23, 2022 Paul Shain Leave a Comment

The threats organizations are facing continue to evolve, and so are the tools they use to manage an emergency. It’s not enough to just alert people that an emergency is occurring. Organizations need robust solutions that give them the ability to actively manage an event from beginning to end. That’s why many mass notification solutions […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.