• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Honeywell logo on tablet, ISA/IEC certification

Honeywell Building Technologies Earns ISA/IEC Cybersecurity Certification

April 14, 2023 TD Staff Leave a Comment

Honeywell Building Technologies (HBT) has earned ISA/IEC 62443-4-1 Process Certification for its software development lifecycle. The ISA/IEC 62443-4-1 certification underscores HBT’s commitment to following best practices and standards in developing secure, cyber-resilient products, says the company. What are the ISA/IEC 62443 standards? The ISA/IEC 62443 standards define requirements and processes for implementing and maintaining electronically […]

Read More

Microsoft Windows 11 Copilot

Microsoft, LinkedIn Launch New Verification Tools

April 12, 2023 Zachary Comeau Leave a Comment

LinkedIn and Microsoft are bringing three new verification options to over 200 million LinkedIn users designed to help organizations be more confident that the people they are collaborating with are real and their work affiliations on their profiles are accurate. According to Microsoft, organizations can use Verified ID, part of the Microsoft Entra identity security […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Is Your Organization Testing Against the Right Cyber Threats?

April 12, 2023 Zachary Comeau Leave a Comment

Ransomware, supply chain attacks and nation-state threat actors have grabbed mainstream headlines in recent years, and organizations are largely recognizing that they must invest more in cybersecurity to defend against those emerging techniques. However, new research shows that some organizations are prioritizing defending against those trending, newsworthy threats at the expense of the threats actually […]

Read More

Zero Trust, ZTNA, Netskope

Check Out CISA’s Updated Zero Trust Guidance

April 11, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released an updated version of its Zero Trust Maturity Model, which bolsters the agency’s zero trust standards with input from a public comment period. While designed for federal agencies, any organization can review the guidance and apply the protections to their infrastructure to help keep malicious actors […]

Read More

Cloud, SASE, Aryaka

7 Strategies for Improving Your Business’s Security in the Cloud

April 11, 2023 Joseph Carson Leave a Comment

Editor’s note: This article was originally published on March 13, 2023 and has since been updated as of April 11, 2023.  Cloud computing offers numerous advantages, including flexibility, cost-effectiveness, scalability, rapid deployment and storage capacity. Still, there are inherent cybersecurity risks with cloud infrastructure, including data breaches and leaks, compromised credentials, and human errors that […]

Read More

Tax day concept. Businessman using the laptop to fill in the income tax online return form for payment.

Best Practices on How to Avoid Phishing Scams Ahead of Tax Day

April 10, 2023 Steven Spadaccini Leave a Comment

With April’s U.S. tax deadline, cybercriminals have sprung into action. For one, a devious Emotet malware phishing campaign has been launched, masquerading as official W-9 tax form emails sent from the Internal Revenue Service (IRS). A malicious group known as Tactical#Octopus is also on the prowl and looking to spread malware through fake file downloads […]

Read More

Genesis Market

Check to See If Your Organization’s Credentials Were on Genesis Market

April 6, 2023 Zachary Comeau Leave a Comment

Genesis Market, online criminal marketplace that advertised and sold packages of stolen credentials that threat actors use to compromise accounts in the financial sector, critical infrastructure and federal, state and local government agencies, has been dismantled by a coalition of international law enforcement agencies. According to a news release from the U.S. Department of Justice, […]

Read More

Data analytics Rocket Content Automation

Rocket Software Launches Rocket Content Automation for Data Modernization

April 5, 2023 Zachary Comeau Leave a Comment

Enterprise software firm Rocket Software is unveiling Rocket Content Automation, a new tool designed to enable critical operational connections between disparate systems and data sources without introducing mainframe migration or compliance risks. According to the Waltham, Mass.-based company, Rocket Content Automation helps drive collaboration between business and IT by creating seamless automation experiences across the […]

Read More

AWS Amazon Security Lake

AWS Launches Clean Rooms to Help Companies Collaborate on Datasets

April 5, 2023 Zachary Comeau Leave a Comment

Amazon Web Services is launching the general availability of AWS Clean Rooms, an analytics service of AWS Applications designed to help organizations and their partners more easily and securely collaborate on their collective datasets without sharing or copying each other’s data. According to the tech giant, the solution allows customers to quickly create a secure […]

Read More

backup storage security

Backup and Storage Devices Contain an Average of 14 Security Issues

April 5, 2023 Zachary Comeau Leave a Comment

With storage and backup devices often representing the last line of defense against ransomware attacks and outages, they should be as secure as possible so organizations can restore their data in a critical time of need. However, new research from cyber resilience company Continuity shows that the average enterprise storage and backup device has 14 […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.