• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cybersecurity Microsoft Software ransomware Patch management Cisco IT management phishing Patch Tuesday AVI-SPL
biometrics

Biometric Authentication Services Available from Modis and LumenVox

May 29, 2019 Lisa Montgomery Leave a Comment

IT departments can outsource speech and biometric authentication through new service.

Read More

data loss and response platforms

Q&A: An Opinion on Data Loss Detection and Response Platforms

May 29, 2019 TechDecisions Staff Leave a Comment

In a world of ever-evolving threats, organizations must be able to protect data regardless of where it travels while enabling collaboration and information sharing, so people can get work done. To react to today’s problems and proactively anticipate tomorrow’s, it takes a whole new set of rules, especially as more businesses push data into public […]

Read More

predictive analytics

Lumina Expands Predictive Analytics and Risk Sensing Capabilities

May 24, 2019 Lisa Montgomery Leave a Comment

New Radiance platform uses predictive analytics to help companies anticipate, manage and mitigate risk.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? May 23 Edition

May 23, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, May 23, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Intel’s chip-making deal

University of Michigan’s MORPHEUS Chip Encrypts 20 Times Per Second

May 23, 2019 Jessica Messier Leave a Comment

The university’s hacker-resistant development changes code and seals off network vulnerabilities faster than ever.

Read More

Internet of Things

City of Baltimore Held Hostage by Ransomware for Weeks

May 22, 2019 Jonathan Blackwood Leave a Comment

A ransomware attack on the city of Baltimore is ongoing, and has held up the city’s infrastructure for two weeks.

Read More

banking

Huntington Offers New Fraud Protection Banking Services

May 22, 2019 Lisa Montgomery Leave a Comment

Huntington’s innovative checking suite designed to make banking easier and safer for business owners.

Read More

cyber security book

Women Know Cyber: New Cyber Security Book Spotlights Women in Network Security

May 22, 2019 TD Staff Leave a Comment

More females are cyberfighters than ever before, according to a new cyber security book by Cybersecurity Ventures titled Women Know Cyber: 100 Fascinating Females Fighting Cybercrime. Women Know Cyber features cyber security experts from across the globe who stand out for protecting governments, businesses, and people from cybercrime — and for their contributions to the community. […]

Read More

Google Cybersecurity Certificate

Security Admins: Know The Value of Security Orchestration Automation Response (SOAR)

May 22, 2019 Jonathan Blackwood Leave a Comment

It isn’t easy being a security operations analyst. Every company needs a cybersecurity portfolio, and the threats out there only continue to grow. Almost daily we see a new attack that costs an organization capital, reputation, or both. Security Orchestration Automation Response (SOAR) tools could provide aid to organizations buried by the potential threats out […]

Read More

Sophos Cybersecurity Trends

3 Ways to Prevent Data Breaches

May 21, 2019 Dan Kiehl Leave a Comment

It seems like every day in the news you read about another data breach. According to a study published by IBM, an organization has a 27% chance of suffering a breach of at least 1,000 records. There have been so many data breaches  in the past several years that now it seems commonplace. “According to […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 121
  • Page 122
  • Page 123
  • Page 124
  • Page 125
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.