• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Cybersecurity testing, penetration testing, cyber threats

This is How Executives and IT Leaders View Cybersecurity Going into 2023

December 14, 2022 Zachary Comeau Leave a Comment

In addition to an expanded partnership with Google and new attack surface management tools, new innovations to Prisma Cloud and more, Palo Alto Networks this week during its Ignite conference released new research that found that nearly all of 1,300 IT leaders surveyed experienced at least one cyber incident or breach over the last year. […]

Read More

Zero Trust, Leostream, AWS

Google Cloud & Palo Alto Networks Team Up to Protect Distributed Workforce

December 13, 2022 Alyssa Borelli Leave a Comment

Palo Alto Networks, the Santa Clara, Calif.-based global cybersecurity provider announced an expanded partnership that brings together BeyondCorp Enterprise from Google Cloud and Prisma Access from Palo Alto Networks to provide hybrid users secure and seamless access to applications — SaaS, cloud or on-premise — from managed or unmanaged devices. Built on the backbone of […]

Read More

June 2023 Patch Tuesday. Patch Tuesday,

December 2022 Patch Tuesday: Two Zero Days, One Being Exploited

December 13, 2022 Zachary Comeau Leave a Comment

Microsoft has released 52 new patches this month as part of its December 2022 Patch Tuesday release, including two zero-day vulnerabilities, one of which is being actively exploited. Of the 52 released, six are rated critical, 43 are rated important and three are rated moderate in severity, according to Zero Day Initiative, which calls this […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Proofpoint to Acquire ITDR Company Illusive

December 13, 2022 Alyssa Borelli Leave a Comment

Proofpoint Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company has entered into a definitive agreement to acquire Illusive, the Identity Threat Detection and Response (ITDR) company​. The acquisition is expected to close by January 2023, subject to customary closing conditions. The cost of the acquisition was not disclosed. With the acquisition, Proofpoint says it will […]

Read More

Secure collaboration

Businesses Need Secure and Fast Collaboration

December 13, 2022 Ofer Klein Leave a Comment

According to a recent study, 96% of corporate executives think that productive remote and hybrid work is dependent on clear communication. Additionally, Slack asserts that the use of collaboration tools can boost productivity by 30%. It makes sense that organizations are adopting these SaaS based technologies, given their many advantages. They facilitate collaboration, which is […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New Tool To Help Automate Vulnerability Remediation

December 12, 2022 Zachary Comeau Leave a Comment

Palo Alto Networks is releasing Xpanse Active Attack Surface Management, a new tool built into the cybersecurity solution provider’s Cortex platform designed to help security teams actively find and fix known and unknown internet-connected risks. According to the Santa Clara, Calif.-based company, Xpanse Active Attack Surface management (Xpanse Active ASM) is designed with automation to […]

Read More

Microsoft Apple macOS bug

Apple Introduces Wider Data Protections, Encryption, Security Keys

December 7, 2022 Zachary Comeau Leave a Comment

Apple has announced three new security features designed to protect user data and protect against threats in the cloud, including wider data protections, the ability to verify the identity of contacts and support for third-party security keys. According to the company, the three new features join a suite of other security tools to make Apple […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Software Inefficiencies are Costing U.S. Economy Trillions, Study Says

December 6, 2022 Zachary Comeau Leave a Comment

Software quality issues such as vulnerabilities, software supply chain problems and technical debt could be costing the U.S. economy trillions, according to a new report from electronic design automation solutions and services firm Synopsys. The Mountain View, Calif. company’s report, “The Cost of Poor Software Quality in the US,” finds that software quality issues may […]

Read More

Malware file types, HP Wolf security

HP: Archive File Format Use Among Hackers on the Rise

December 5, 2022 Zachary Comeau Leave a Comment

Office files are no longer the most common file type for delivering malware, as archive file formats such as ZIP and RAR files are the file type of choice for threat actors to deliver malware, according to a new report from HP Wolf Security. The findings come from a quarterly report from HP’s endpoint security […]

Read More

Microsoft Windows 11 Copilot

Microsoft Launches New Entra Admin Center to Unify Identity, Access Products

December 2, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a staged rollout of the Entra admin center for Microsoft 365 and Azure Active Directory customers, to unify Azure AD with other identity and access products. According to the Redmond, Wash.-based company, the move is part of a vision for identity that goes beyond traditional identity management to give customers an entire […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.