• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
MFA bypass, AiTM

Microsoft Warns of Increasing Use of MFA Bypass Tools in Phishing Attacks

March 14, 2023 Zachary Comeau Leave a Comment

Microsoft is warning organizations of an uptick in Adversary-in-the-Middle (AiTM) phishing kits that are capable of bypassing multi-factor authentication (MFA) through reverse-proxy functionality, rendering the security tool that many organizations now deploy useless. In a new blog, the Microsoft Threat Intelligence Team dives into a threat actor it calls DEV-1101, a group that develops, supports […]

Read More

Microsoft Accessibility Assistant

Microsoft Launches New Accessibility Assistant for Microsoft 365 Apps

March 10, 2023 Zachary Comeau Leave a Comment

Microsoft is launching Accessibility Assistant in Microsoft 365, a new set of tools designed to help creators produce more accessible content while in the flow of work. The Redmond, Wash. IT giant says the Accessibility Assistant expands on the existing Accessibility Checker by introducing better defaults to prevent issues before they occur, real-time and in-context […]

Read More

Mattermost Microsoft Teams

Mattermost Launches Microsoft Teams Solution

March 9, 2023 Zachary Comeau Leave a Comment

Mattermost, a favorite collaboration platform among tech workers, is launching a new solution for Microsoft Teams designed to speed up technical workflows. The Palo Alto, Calif.-based company’s solution, Mattermost for Microsoft Teams, enables technical users to stay connected to Microsoft’s flagship enterprise collaboration platform while collaborating in a highly customized technical collaboration environment that includes […]

Read More

Data analytics Rocket Content Automation

Orchestrating the Data Symphony: Start with ‘What’ and ‘Why’ Before ‘How’

March 8, 2023 Avinob Roy Leave a Comment

Managing data is a lot like conducting an orchestra. Many diverse parts combine to create a symphony, and data analysts are the conductors responsible for achieving it. They do this by harmonizing multiple data points into a single repository, and then extracting insights thoughtfully. Data teams, i.e., data engineers and data analysts, are the core […]

Read More

IT Generative AI, ChatGPT

ChatGPT and Generative AI a ‘Game Changer,’ but Issues Persist

March 8, 2023 Zachary Comeau Leave a Comment

ChatGPT and other new AI models are widely believed to be a game changer across many industries, including IT. However, IT leaders are also expressing concerns with implementing the generative AI too soon, according to new Salesforce research. The CRM giant’s survey of more than 500 IT leaders finds that 67% are prioritizing generative AI […]

Read More

U.S. Cybersecurity Strategy

The Five Pillars of the New U.S. Cybersecurity Strategy

March 6, 2023 Zachary Comeau Leave a Comment

The Biden-Harris Administration has released its five-pronged National Cybersecurity Strategy designed to secure the digital ecosystem by putting more of the burden for cybersecurity on tech organizations and encouraging long-term investments in security. The Administration’s vision is meant to make the country’s digital ecosystem defensible, resilient and values aligned. The new strategy comes in the […]

Read More

Phishing, Email security

Phishing Remains a Favorite Hacking Tool as New Methods Emerge

March 3, 2023 Zachary Comeau Leave a Comment

Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]

Read More

Google, Passkeys

Google Rolls Out Client-Side Encryption to Gmail, Calendar

March 1, 2023 Zachary Comeau Leave a Comment

Google is expanding client-side encryption capabilities across Google Workspace, making the enhanced encryption generally available for three advanced Workspace plan types in Gmail and Calendar after enabling the security control for Drive, Docs, Slides, Sheets and Meet last year. Client-side encryption (CSE) is now generally available for Google Workspace Enterprise Plus, Education Plus and Education […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Older, Unpatched Vulnerabilities Are Still Wreaking Havoc

February 28, 2023 Zachary Comeau Leave a Comment

Older vulnerabilities for which patches have already been made available by the vendor are still the primary vehicle for cyberattacks, suggesting that organizations are still behind in practicing good cyber hygiene, according to new data from Tenable. The Columbia, M.D.-based provider of vulnerability management software finds in its 2022 Threat Landscape Report that the number […]

Read More

Microsoft Bing

Microsoft Is Now Limiting Bing Chat Questions So The Model Doesn’t Get Confused

February 22, 2023 Zachary Comeau Leave a Comment

[Editor’s note: A previous version of this article on Feb. 21 stated that Microsoft would be capping Bing chat turns at 50 per day and five per session, which Microsoft announced last Friday. Later Tuesday, Feb. 21st the company updated those numbers to 60 and six, respectively. This post has also been updated with an […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.