• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
biggest data breaches, data breaches list, data breaches and hacks

The 5 Biggest Data Breaches in 2019 So Far (And How They Could Have Been Prevented)

June 20, 2019 Adam Forziati Leave a Comment

IBM says in a study that the cost of lost business after a breach for US organizations is $4.2 million. It is evident, then, that the organizations involved in the 5 biggest data breaches in 2019 thus far will likely suffer a considerable economic blow.   But if you read this data breaches list thinking, “these are mega-companies; the risk of a data […]

Read More

IoT adoption

IoT Adoption Survey from Metova Takes the Good (Adoption) with the Bad (Security Concerns)

June 20, 2019 TechDecisions Staff Leave a Comment

Mobile, connected home and other IoT solutions company Metova announces the results of their second annual survey, which reveals consumer trends and feelings on IoT adoption. This year’s research shows less than 25% of over 1000 people surveyed feel like they have a “good understanding of what IoT is.” Yet, nearly 75% of consumers already […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

Proofpoint CISO, CISOs cyberattack

Cybersecurity Remains Inadequate Following 2016 Election

June 18, 2019 Sam Harton Leave a Comment

Despite the fact that scandals relating to cybersecurity and privacy policy riddled headlines following the presidential election, there has been little federal reform in those realms.

Read More

Featured Video Play Icon

Axis Communications Says it’s the ‘First Company to Switch from Analog to IP-Based Security’

June 12, 2019 Adam Forziati Leave a Comment

IP security wasn’t always revered — in fact, it was a topic of suspect by many A/V professionals only a short few years ago. But with advances in encryption and other cybersecurity measures, things like IP-based monitoring systems started cropping up all over the place. But Swedish-founded company Axis Communications says it was the first to […]

Read More

software

SIG Platform Blends Software Analysis with Expertise of Consultants

June 10, 2019 Lisa Montgomery Leave a Comment

A new concept implemented by Software Improvement Group aims to improve software security and health.

Read More

Cloud Migration

Avoid These ‘Seven Deadly Sins’ of Public Cloud Migration Strategies

June 4, 2019 Keith Bromley Leave a Comment

Many enterprise IT teams have experienced, or continue to experience, problems with the migration of their physical on-premises networks to their new cloud solutions. Despite all of the hype about how great public clouds are, there are normally issues with a public cloud migration that include: performance problems, service outages, missed security threats, and more. […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? June 3 Edition

June 3, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, June 3, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

cybercrime

DomainTools Integrates with Anomali for Advanced Protection Against Cybercrime.

May 30, 2019 Lisa Montgomery Leave a Comment

Threat detection, investigation and incident response provide companies with greater detail about potential cybercrime.

Read More

surge

Are You Protecting Your IT Equipment from Lighting and Surge Damage?

May 29, 2019 Lisa Montgomery Leave a Comment

L-com launches indoor and outdoor rated Cat6a lightning and surge protectors for Ethernet-connected equipment.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 120
  • Page 121
  • Page 122
  • Page 123
  • Page 124
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.