• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
SASE, SASE approaches, SASE implementation

Code42 and SentinelOne Partner to Uncover Risk to Data & Accelerate Response to Insider Threats

March 7, 2023 Alyssa Borelli Leave a Comment

Code42 Software, Inc., the Minneapolis-based provider of Insider Risk Management (IRM), and SentinelOne, Inc., an autonomous cybersecurity platform company, announced a new partnership that integrates the Code42 Incydr solution with the SentinelOne Singularity Platform. This integration grants users additional visibility over their most sensitive data and expands response capabilities in the event of an insider threat […]

Read More

U.S. Cybersecurity Strategy

The Five Pillars of the New U.S. Cybersecurity Strategy

March 6, 2023 Zachary Comeau Leave a Comment

The Biden-Harris Administration has released its five-pronged National Cybersecurity Strategy designed to secure the digital ecosystem by putting more of the burden for cybersecurity on tech organizations and encouraging long-term investments in security. The Administration’s vision is meant to make the country’s digital ecosystem defensible, resilient and values aligned. The new strategy comes in the […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New AI-Driven Identity Threat Detection and Response Model for SOC Solution

March 6, 2023 Zachary Comeau Leave a Comment

Cybersecurity giant Palo Alto Networks is launching its new Identity Threat Detection and Response module for its autonomous security operations center (SOC) solution Cortex XSIAM.   The Santa Clara, Calif.-based firm says the new solution enables customers to ingest user identity and behavior data and deploy AI technology to help detect identity-driven attacks within seconds, […]

Read More

Royal Ransomware

FBI, CISA Warn of Royal Ransomware Targeting Critical Infrastructure

March 3, 2023 Zachary Comeau Leave a Comment

U.S. agencies are warning critical infrastructure organizations to be on the lookout for Royal ransomware, a financially motivated threat actor that has been targeted manufacturing, communications, healthcare and education entities since September 2022. In a joint advisory, the FBI and U.S. Cybersecurity and Infrastructure Security Agency say the Royal ransomware actors have compromised U.S. and […]

Read More

Phishing, Email security

Phishing Remains a Favorite Hacking Tool as New Methods Emerge

March 3, 2023 Zachary Comeau Leave a Comment

Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]

Read More

Cybersecurity testing, penetration testing, cyber threats

No Organization Is an Island: How to Protect Against Supply Chain Attacks

March 2, 2023 Dirk Schrader Leave a Comment

Every organization interacts with other organizations: suppliers, partners, customers, government agencies and more. As a result, you can suffer a breach even though your organization was not directly targeted. For example, adversaries were able to release the infamous NotPetya malware to thousands of companies worldwide by compromising the supplier of a popular accounting software solution. […]

Read More

CISA Software Security

What CISA Learned After Conducting a Red Team Assessment of a Large Critical Infrastructure Organization

March 1, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory that describes a CISA red team assessment of a large critical infrastructure organization with a mature cyber posture, with the goal of sharing its key findings to help IT and security professionals improve monitoring and hardening of networks. According to the advisory, […]

Read More

MIcrosoft Entra External ID

Microsoft Launches Intune Suite for Unified Endpoint Management, Security

March 1, 2023 Zachary Comeau Leave a Comment

Microsoft is launching the Microsoft Intune Suite, a new unified endpoint management and security bundle designed to simplify endpoint management experiences, improve an organization’s security posture and improve the user experience. According to a Microsoft blog written by Michael Wallent, corporate vice president, of the company’s enterprise mobility management products, the new Intune Suite is deeply […]

Read More

Windows 11 Education

Microsoft Rolls Out New Windows 11 Education Features

March 1, 2023 Zachary Comeau Leave a Comment

Microsoft is rolling out a new set of easy-to-use collaboration, accessibility and security features in Windows 11 designed for education organizations. The new Windows 11 education features Microsoft highlights include new IT management features, live captions, focus features to help eliminate distractions, simple sign-in and personalized desktop themes. According to Microsoft, school IT administrators in […]

Read More

Google, Passkeys

Google Rolls Out Client-Side Encryption to Gmail, Calendar

March 1, 2023 Zachary Comeau Leave a Comment

Google is expanding client-side encryption capabilities across Google Workspace, making the enhanced encryption generally available for three advanced Workspace plan types in Gmail and Calendar after enabling the security control for Drive, Docs, Slides, Sheets and Meet last year. Client-side encryption (CSE) is now generally available for Google Workspace Enterprise Plus, Education Plus and Education […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.