• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

IT Infrastructure

Your organization won’t get anywhere without a reliable network. Your IT Infrastructure needs to be in top shape, from servers to services, from hardware to software, and more.

Popular Tags within: IT Infrastructure

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
NSA Programming Languages

Honeywell Expands OT Cybersecurity Portfolio With Acalvio Technologies

January 11, 2022 TD Staff Leave a Comment

Honeywell and Acalvio Technologies have launched a new solution designed to detect known and unknown (zero-day) attacks across the operational technology (OT) environments in commercial buildings. Honeywell Threat Defense Platform (HTDP) powered by Acalvio uses “sophisticated active defense – featuring autonomous deception tactics to outsmart attackers,” providing “high fidelity threat detection,” according to the company. […]

Read More

Microsoft January Patch Tuesday

Admins Have 122 Microsoft Bugs To Patch This Month

January 11, 2022 Zachary Comeau Leave a Comment

Microsoft has released patches for nearly 100 vulnerabilities this Patch Tuesday, including three Exchange remote code execution bugs and an HTTP protocol stack remote code execution vulnerability. Despite the unusually large amount of patches to start the year, none are listed as being actively exploited. However, six are listed as publicly known at the time […]

Read More

Proofpoint CISO, CISOs cyberattack

Cyberattacks Increased By 50% In 2021

January 11, 2022 Zachary Comeau Leave a Comment

Not that anyone assumed differently, but cyberattacks proliferated the internet in 2021, with researchers noting 50% more attacks per week on corporate networks compared to 2020, according to cybersecurity firm Check Point. The 2021 data comes just a few months after the company reported in October a 40% increase in cyberattacks globally. However, the fourth […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

A Chinese Ransomware Operator Is Leveraging Log4j Bugs, VMWare Horizon

January 11, 2022 Zachary Comeau Leave a Comment

The IT and cybersecurity community sounded the alarm last month when researchers discovered vulnerabilities in Log4j, the ubiquitous java logger used by a wide range of tech products. The tool has been patched and vendors are quickly deploying its own patches for products that use the tool, but the situation is not getting much better […]

Read More

RF Venue Enhances Wireless Mic Performance at New England Church

January 11, 2022 TD Staff Leave a Comment

Recently, Vox Church outfitted its campuses with RF Venue Antennas, combiners and distribution products to ensure consistent and reliable wireless microphone performance. RF Venue is an Ashland, Mass.-based manufacturer of patented antennas and communication products. Vox Church is a multi-site, non-denominational church that puts a lot of emphasis on music performances and communication from the […]

Read More

Log4J SBOM

Log4j Highlights the Need for a Software Bill of Materials; Here’s How to Create One

January 11, 2022 Bren Briggs, VP of DevOps and Cybersecurity at Hypergiant. Leave a Comment

Just days into the new year and the cybersecurity community is already playing catch up thanks to the recent Log4j vulnerability which illuminated major setbacks in how organizations deal with its own software and open-source packages on which its relies on. In particular, organizations have been caught off guard in auditing its own systems, giving […]

Read More

Royal Ransomware

Are Ransomware And Terrorism Threats Equal?

January 10, 2022 Alyssa Borelli Leave a Comment

Almost two-thirds (60%) of IT decision makers believe ransomware threats should be prioritized at the same level as terrorism, according to latest research by Venafi, a Salt Lake City-based provider of machine identify management solutions. The research comes after the U.S Department of Justice raised the threat level of ransomware following the Colonial Pipeline attack […]

Read More

FBI USB Drives

FBI: Don’t Insert USB Drives That Suspiciously Arrive In The Mail

January 10, 2022 Zachary Comeau Leave a Comment

Organizations in the transportation, defense and insurance industries should be on the lookout for suspicious USB drives that arrive in the mail, as they may contain malicious payloads and ransomware. According to a new FBI alert obtained by CNN, The Record, Bleeping Computer and other publications, the ransomware group FIN7—the same group behind the BlackMatter […]

Read More

IT hiring challenges, tech employment

Tech Hiring Thrives as National Employment Growth Slows

January 7, 2022 TD Staff Leave a Comment

Technology-related employment and hiring opportunities continue to expand, according to an analysis by CompTIA, the Downer’s Grove, ILL.-based nonprofit association for the IT industry and workforce. Technology industry companies added 11,000 workers in December, according to data from the U.S. Bureau of Labor Statistics, which shows the 13th consecutive month of tech employment growth at […]

Read More

Google Microsoft Office Offline

Researchers Discover Google Docs Comment Exploit

January 7, 2022 Zachary Comeau Leave a Comment

Threat actors are leveraging the comment feature in Google Docs and other Google collaboration tools to send malicious content, primarily to Outlook users. According to new research from cybersecurity firm Avanan, hackers have found a way to use these useful collaboration tools from Google to target Outlook users, hitting over 500 inboxes across 30 tenants, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 108
  • Page 109
  • Page 110
  • Page 111
  • Page 112
  • Interim pages omitted …
  • Page 235
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.