• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Data Center Automation

Gartner: Data Center Automation Will Advance Significantly by 2025

November 1, 2021 Zachary Comeau Leave a Comment

Within the next five years. half of all data centers will deploy advanced artificial intelligence and machine learning technologies, resulting in a significant efficiency boost, according to IT research firm Gartner. By 2025, half of cloud data centers will use advanced robots with AI and machine learning capabilities, which will increase operating efficiency by 30%, […]

Read More

Microsoft Security RSA Conference

How Microsoft Is Partnering With Community Colleges To Close the Cybersecurity Workforce Gap

October 29, 2021 Zachary Comeau Leave a Comment

Microsoft, in a bid to close the U.S. cybersecurity skills gap, is leveraging the help of the country’s community colleges with the goal of recruiting 250,000 cybersecurity professionals into the workforce by 2025. According to the company, that represents half of the country’s cybersecurity workforce shortage. Those professionals will work for both Microsoft and other […]

Read More

Most Common Active Directory Misconfigurations

The 3 Most Common Misconfigurations in Microsoft Active Directory (and How to Fix Them)

October 29, 2021 Andy Robbins Leave a Comment

Microsoft Active Directory (AD) is one of, if not THE, most critical services used by organizations of all sizes. In fact, for roughly 90% of Global Fortune 1000 companies, AD is the primary method utilized for seamless authentication and authorization when connecting and managing individual endpoints inside corporate networks. Research has revealed that AD also […]

Read More

Yubico USB-C NFC

Yubico Releases USB-C, NFC Security Key

October 26, 2021 TD Staff Leave a Comment

Security key maker Yubico has released new USB-C and near-field communication (NFC) security keys to meet demand as more devices leverage USB-C. The company’s Security Key C NFC is the latest to join its portfolio of security keys, offering FIDO-only support in a USB-C form factor with NFC capabilities. This joins the Security Key NFC, […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

SolarWinds Hackers Are Targeting IT Services Providers and Their Customers

October 25, 2021 TD Staff Leave a Comment

Microsoft says the same Russian hacking group behind the compromise of the SolarWinds Orion platform is targeting IT service providers and cloud technology resellers to leverage their privileged access to end customer networks. In a series of blogs, Microsoft says the threat actor it calls Nobelium is targeting cloud service providers, managed service providers and […]

Read More

Privacy Manager for Microsoft 365

Microsoft Makes Privacy Easier With Privacy Management For Microsoft 365

October 22, 2021 Zachary Comeau Leave a Comment

Microsoft has launched Privacy Management for Microsoft 365, a new tool designed to enable customers to protect their personal data and build a privacy-resilient workplace. In multiple blogs, the company cited the fluidity of hybrid work and the merging of work and personal activities, which is leading to more personal data being generated, creating additional […]

Read More

cryptocurrency NCET

6 Money Laundering Typologies Attributed to Ransomware

October 18, 2021 Alyssa Borelli Leave a Comment

As ransomware continues to be an increasing threat to the US financial sector, businesses, and the public, the U.S. Treasury’s Crimes Enforcement Network (FInCEN) has identified six money laundering typologies related to ransomware payments: 1. Threat Actors Increasing Request Payments in AECs Ransomware-related payments are initially requested in Bitcoin, however threat actors may also ask […]

Read More

Howard College Anthology Student Verification

Howard College Modernizes Student Financial Aid Verification with Anthology

October 18, 2021 TD Staff Leave a Comment

Howard College – a community college serving a diverse student body in the West Texas areas of Big Spring, Texas with  campuses in San Angelo, Lamesa and Southwest College for the Deaf – needed a way to streamline, automate and centrally manage its student financial aid verification process. The institution’s financial aid department’s goal was […]

Read More

cryptocurrency NCET

What The National Cryptocurrency Enforcement Team (NCET) Will Do

October 7, 2021 Alyssa Borelli Leave a Comment

As law enforcement authorities are grappling with the rise of ransomware and cryptocurrency technologies, Deputy Attorney General Lisa O. Manac has formed a new National Cryptocurrency Enforcement Team (NCET). The team will tackle complex investigations and prosecutions of criminal misuses of cryptocurrency and investigate crimes committed by virtual currency exchanges, mixing and tumbling services, and […]

Read More

Microsoft January Patch Tuesday

Microsoft Announces Partnership With Cyber Insurance Industry

October 1, 2021 Zachary Comeau Leave a Comment

Microsoft has announced a new multiyear commitment to help the insurance industry create cyber insurance products with the support of Microsoft’s security solutions. According to Microsoft, the technology firm is teaming up with insurance partners to offer insurance products that allow customers to safely share security posture information through platforms like Microsoft 365 and the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 45
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.