• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
F5 headquarters, AI API

F5 Releases New AI-Powered App and API Security Tools

April 4, 2023 Zachary Comeau Leave a Comment

Cybersecurity company F5 is releasing new AI-powered app and API security capabilities designed to give customers comprehensive protection and control in managing apps and APIs across on-premises, cloud and edge locations. According to the Seattle-based application services and security company, new machine learning enhancements will provide the company’s cloud security portfolio with advanced API endpoint […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

These Dangerous Vulnerabilities on CISA’s KEV List Are Still Being Widely Exploited

April 3, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has been keeping an updated list of Known Exploited Vulnerabilities (KEV) that currently includes more than 900 security bugs, with the goal of helping inform organizations about vulnerabilities that should be prioritized. Despite that awareness campaign and emphasis on vulnerabilities that have been exploited in the wild, new […]

Read More

3CX Supply Chain Attack

3CX Compromised in Supply Chain Attack

March 31, 2023 Zachary Comeau Leave a Comment

Cybersecurity researchers say a vulnerability in the desktop app from VoIP provider 3CX is being actively exploited in supply chain attacks, leading to possible hands-on-keyboard activity by advanced threat actors, including nation-state actors. According to researchers, malicious activity was observed coming from a legitimate signed binary, 3CXDesktopApp — a softphone application from 3CX. Cybersecurity firm […]

Read More

ChatGPT, OpenAI, iOS, Mobile, App

Pump the Brakes on AI Development, Tech and AI Experts Say

March 30, 2023 Zachary Comeau Leave a Comment

Ever since OpenAI released ChatGPT to the public late last year, the speed of innovation in the field of artificial intelligence–specifically generative AI–has been blistering. Tech companies are feverishly working to develop more intelligent systems and essentially add intelligent assistants to a wide range of tools to help users be more efficient and creative. But […]

Read More

Progress MOVEit vulnerability

Ransomware Actors May Be Targeting Organizations With Cyber Insurance

March 29, 2023 Zachary Comeau Leave a Comment

Cybersecurity insurance is becoming a popular option for organizations looking to protect themselves from the financial risks of a cyberattack, but new data shows that organizations with cyber insurance may be more appealing to ransomware attackers. According to Barracuda Networks, 77% of organizations with cyber insurance were hit by a successful ransomware attack in 2022, […]

Read More

Passwordless

Bitwarden Releases Beta of Secrets Manager for DevOps Environments

March 29, 2023 Zachary Comeau Leave a Comment

Password manager provider Bitwarden is launching the open beta of Bitwarden Secrets Manager, a new tool designed to centrally secure and manage sensitive authentication credentials within privileged developer and DevOps environments. According to the Santa Barbara, Calif.-based company, the new tool can help development teams working across applications and multi-cloud infrastructures dealing with distributed secrets […]

Read More

Zoom Okta E2EE

Zoom Users Can Now Use Okta to Authenticate Identity of Attendees

March 29, 2023 Zachary Comeau Leave a Comment

Users with paid Zoom accounts can now authenticate the identity of meeting attendees in end-to-end encrypted meeting with Okta Authentication for E2EE. The feature essentially allows Zoom users to leverage the identity and access management technology from Okta to authenticate a meeting attendee’s identity by email in end-to-end encrypted (E2EE) meetings. According to Zoom, users […]

Read More

Microsoft Security Copilot

Microsoft Brings Generative AI to Defenders with Security Copilot

March 28, 2023 Zachary Comeau Leave a Comment

Microsoft has infused the powers of generative AI, ChatGPT and OpenAI’s language models throughout its product portfolio, and the company is now bringing the technology to its security tools with the launch of Microsoft Security Copilot. According to Microsoft, Security Copilot will help enable defenders to leverage AI to be more efficient by combining an […]

Read More

CISA Software Security

Use This Free CISA Tool for Threat Hunting, Incident Response

March 27, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released the Untitled Goose Tool, a free  tool designed to help network defenders detect malicious activity in Microsoft Azure, Azure Active Directory (AAD) and Microsoft 365 (M365) environments. According to CISA, the Untitled Goose Tool offers novel authentication and data gathering methods for network defenders to use […]

Read More

New Microsoft Teams

Microsoft’s New Teams App is Twice as Fast, More Intelligent

March 27, 2023 Zachary Comeau Leave a Comment

Microsoft is launching the public preview of a new Microsoft Teams app for Windows that the company says is twice as fast and uses half the system resources, the result of a ground-up investment designed to overhaul the platform to optimize the data, network, chat and video architecture for speed and performance. The company says […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.