• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

IT Infrastructure

Your organization won’t get anywhere without a reliable network. Your IT Infrastructure needs to be in top shape, from servers to services, from hardware to software, and more.

Popular Tags within: IT Infrastructure

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Microsoft Authenticator Password

Microsoft Releases Password Generation in Authenticator

May 3, 2022 Zachary Comeau Leave a Comment

Microsoft has released the availability of a strong password generator in Microsoft Authenticator, giving the authentication tool’s 75 million-plus active users the ability to generate a strong, random password. Microsoft Authenticator currently provides passwordless authentication, push notifications, time-based one-time passwords and security alerts in addition to autofill passwords and other features. While the IT community […]

Read More

Microsoft Security RSA Conference

Microsoft Defender For Business Is Now Generally Available

May 2, 2022 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of the stand-alone version of Microsoft Defender for Business, a new offering designed for small-to-mid-sized businesses that brings enterprise-grade endpoint security, detection and response to smaller organizations. According to Microsoft, this is designed to provide protection against ransomware and other sophisticated cyberattacks for SMBs, who say cyberthreats are becoming […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

Shure MXA920

Shure Launches New MXA920 Ceiling Array Microphone

May 2, 2022 Zachary Comeau Leave a Comment

Audio solutions provider Shure is launching a new addition to its lineup of conferencing array microphones with its new MXA920 Ceiling Array Microphone, featuring advanced audio capturing technologies and easy deployment and management. The in-ceiling networked array microphones feature pre-configured audio capture, next generation array architecture for enhanced directional pick-up and more natural speech and […]

Read More

ClearOne logo

ClearOne Enhances CONVERGENCE AV Manager Platform with New Features

May 2, 2022 TD Staff Leave a Comment

ClearOne has added new features for its CONVERGENCE AV Manager. This is the company’s unified software platform to monitor, control and audit Pro Audio products from any location worldwide. It is available as a Cloud AV Manager or an Enterprise AV Manager. According to ClearOne, the Cloud AV Manager service offers multi-tenant Management as a […]

Read More

Writing

Write for Us: Why You Should Write for MyTechDecisions

May 1, 2022 TD Staff Leave a Comment

Some of the most insightful columns on MyTechDecisions are written by, not surprisingly, tech decision makers. Make it your New Year’s Resolution to write for us in 2019.

Read More

Shadow IT Remote Work

Is a Reliance on Cloud, SaaS Apps Leading to Shadow IT?

April 29, 2022 Zachary Comeau Leave a Comment

A new report finds that the ongoing distributed work experiment and expanding use of enterprise technology is leading to IT management blind spots and shadow IT at more than 70% of organizations. According to enterprise technology management solutions provider Oomnitza, which surveyed IT leaders from 100 enterprises of more than 5,000 employees across the U.S., […]

Read More

Hybrid Work security

The Great Resignation and Hybrid Work are Changing the Security Landscape

April 29, 2022 Jimmy Chang Leave a Comment

Record numbers of Americans are quitting their jobs in what many are now calling the “Great Resignation.” Remaining employees who have had an opportunity to prove their value and ability to work productively from anywhere are placing intense pressure on their employers to support a remote/hybrid work environment. Gartner recently stated that “51% of global knowledge workers will be […]

Read More

Google Cybersecurity Certificate

Red Canary Announces Linux-First EDR, MDR Solution

April 29, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Red Canary is launching a new endpoint detection and response solution for Linux, designed to focus on the constraints that DevOps, engineering and security teams demand. According to the company, the Linux EDR and MDR solution will help organizations better protect their Linux environments, which can be difficult to secure. The solution leverages […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Make Sure These 15 Most Exploited Vulnerabilities From 2021 Are Patched

April 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with a coalition of U.S. and foreign security and law enforcement agencies, have released a list of the 15 most exploited vulnerabilities from 2021, calling on both public and private organizations to ensure these critical security bugs are mitigated and systems patched. The list, published in a […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 84
  • Page 85
  • Page 86
  • Page 87
  • Page 88
  • Interim pages omitted …
  • Page 235
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.