• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

IT Infrastructure

Your organization won’t get anywhere without a reliable network. Your IT Infrastructure needs to be in top shape, from servers to services, from hardware to software, and more.

Popular Tags within: IT Infrastructure

Collaboration Cloud Hybrid Work Education UCC Microphones AI Mass Notification IT Security
VMware Vulnerabilities

VMware: Patch These Vulnerabilities Immediately

February 15, 2022 Zachary Comeau Leave a Comment

VMware is urging customers to immediately patch vulnerabilities in ESXi, Workstation, Fusion and Cloud Foundation running in on-premises or co-located settings. The patches fix a total of five CVEs in those products that were disclosed during the Tianfu Cup, a Chinese security event that VMware participates in. According to the company, the flaws were reported […]

Read More

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Introduces Chrome OS Flex To Replace Windows, macOS On Older Devices

February 15, 2022 Zachary Comeau Leave a Comment

Google has introduced a new version of Chrome OS that can turn PCs and Macs into a Chromebook, and the software designed for businesses and schools will be free to download, the company says. In a blog, the company says Chrome OS Flex will be fully compatible with Google’s cloud-based management and helps modernize endpoints […]

Read More

Proofpoint CISO, CISOs cyberattack

Red Canary Adds 24/7 Remediation, Protection Features

February 15, 2022 Zachary Comeau Leave a Comment

Threat detection provider Red Canary has added new capabilities and active remediation features to its cybersecurity offerings, including protections for systems beyond the endpoint and a new active 24/7 threat response offering. According to the company, the new threat investigation and active remediation features are designed to help customers investigate, triage and respond to threats, […]

Read More

Amazon facial recognition, police

Privacy Claims, Lawsuits Related to Biometrics Will Reach $8 Billion in 2025

February 15, 2022 Zachary Comeau Leave a Comment

Lawsuits and claims related to biometric information processing and cyber-physical systems will reach $8 billion in fines and settlements by 2025 as privacy budgets are also expected to grow significantly, according to IT research firm Gartner. AI-enabled technologies, smart buildings, smart cities and other cyber-physical systems that capture biometric information are growing, but that information […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Navigating the IT Considerations of M&A

February 14, 2022 Zachary Comeau Leave a Comment

In today’s digital age, when technology drives innovation and serves as a foundational piece of any organization, the IT department is a critical consideration when conducting a merger or an acquisition. Integrating the technology used by each organization is an incredibly important and time-consuming task that requires diligence and deliberate decision-making to ensure that the […]

Read More

Young man with vr headset

Security Vulnerabilities Found in VR Headsets

February 14, 2022 TD Staff Leave a Comment

Voice command features on virtual reality (VR) headsets pose vulnerabilities and could lead to major privacy eavesdropping attacks, according to researchers at Rutgers University-New Brunswick. The research shows hackers could use popular AR/VR headsets with built in motion sensors to record subtle, speech-associated facial dynamics to steal sensitive information communicated via voice-command, including credit card […]

Read More

CISA Software Security

This CISA Resource Can Help Protect You From Actively Exploited Bugs

February 14, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been extremely active in helping both the public sector and private sector respond to cybersecurity threats, and is often one of the leading voices when new threats emerge. The agency, part of DHS, has released guides, advisories and other resources on current and historical threats, and […]

Read More

Malware Symantec Daxin

Sansec Finds Mass Breach Of Stores Running On Magento 1 E-Commerce Platform

February 11, 2022 TD Staff Leave a Comment

Adobe is urging organizations who use the Magento 1 e-commerce platform to upgrade to the latest Adobe Commerce platform. Sansec, an e-commerce malware and detection tool has identified a mass breach of over 500 stores running on the Magento 1 ecommerce platform. Although Adobe ended support for Magento 1 in June of 2020, many companies […]

Read More

Windows 11, Windows 365 Boot, IT management, privacy, security,

Check Out These New Windows 11 Test Build Features

February 11, 2022 Zachary Comeau Leave a Comment

Along with over a dozen bug fixes, Microsoft has added several new features to its Windows 11 Build 22000.526 for Windows Insiders in the Beta and Release Preview channels, including support for Windows Hello for Business Cloud Trust. In a blog post outlining the new features and improvements, Microsoft calls Windows Hello for Business Cloud […]

Read More

Google, Passkeys

Google To Convert Currents Users To Spaces

February 11, 2022 Zachary Comeau Leave a Comment

Google is planning to wind down Currents in favor of Spaces, its platform dedicated for organizing people, topics and projects in Google Workspace. The planned wind down will begin in 2023 as the company will bring remaining content and communities from Currents to the new Spaces experience, the company says in a new blog. The […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 101
  • Page 102
  • Page 103
  • Page 104
  • Page 105
  • Interim pages omitted …
  • Page 236
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.