• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches Cortex XSIAM for SOCs

October 12, 2022 Zachary Comeau Leave a Comment

Cybersecurity giant Palo Alto Networks is launching the general availability of Cortex XSIAM, a new autonomous security operations platform designed to power modern security operations centers (SOC) and change the way data, analytics and automation are used in enterprise and cloud security operations. The general availability comes after the company earlier this year made the […]

Read More

Fortinet Vulnerability, Fortigate

Tenable Launches Initiative to Help Organizations Remediate Vulnerabilities Faster

October 12, 2022 Zachary Comeau Leave a Comment

Vulnerability management company Tenable is creating a new research alliance program designed to share information prior to vulnerability disclosures and reduce the window of opportunity threat actors have to exploit newly disclosed vulnerabilities. According to the company, the Tenable Research Alliance Program allows security teams and system administrators to address attack paths and mitigate vulnerabilities […]

Read More

June 2023 Patch Tuesday. Patch Tuesday,

October 2022 Patch Tuesday: 13 Critical, One Actively Exploited

October 11, 2022 Zachary Comeau Leave a Comment

Microsoft has released fixes for 85 vulnerabilities as part of the October 2022 Patch Tuesday, including 15 that are rated critical and one listed as being exploited in the wild. However, the company still has yet to release patches for the two Exchange vulnerabilities that were reported as being actively exploited last week. Admins should […]

Read More

CISO Burnout

CISO Burnout: Security Leaders are Working Nearly 17 Extra Hours Per Week

October 11, 2022 Zachary Comeau Leave a Comment

Chief information security officers (CISOs) are working more than ever, and the extra hours, stress and fatigue are leading to increasing rates of burnout, according to new research from email security company Tessian. The company’s research follows its inaugural CISO Lost Hours report last year that found CISOs were missing holidays, family vacations and other […]

Read More

Insider Risk, Microsoft

Microsoft: IT Departments are in Insider Risk Crosshairs

October 7, 2022 Zachary Comeau Leave a Comment

As the amount of data being captured, copied and consumed in enterprises grows exponentially, organizations have had their hands full securing it from external attackers. However, organizations must also protect that data from insiders and preventing that data from leaving the organization and falling into the wrong hands. IT and security professionals are most often […]

Read More

This Week in IT, IT News

This Week in IT: Sneaky Ransomware; Google, Army Partnership; Digital Transformation; Chinese Hackers

October 6, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. BlackByte ransomware group disables security products […]

Read More

Microsoft Defender for APIs

Microsoft Adds Identity Theft Monitoring to Defender for Individuals

October 6, 2022 Zachary Comeau Leave a Comment

In an attempt to help secure the identity of personal uses, Microsoft is releasing a new identity theft monitoring capability in Defender for Individuals to personal and family subscribers of Microsoft 365. According to Microsoft, the identity theft monitoring solution is a partnership with Experian that leverages the credit agency’s identity monitoring technology to detect, […]

Read More

SASE, SASE approaches, SASE implementation

Aryaka Announces Zero Trust WAN Based on Unified SASE Architecture

October 6, 2022 Zachary Comeau Leave a Comment

Networking company Aryaka is building onto its zero trust WAN offerings with the inclusion of Secure Web Gateway and Firewall-as-a-Service, an integration the company says is the first that allows enterprises to easily enforce security policies across offices and remote users with unified control, performance and stability. According to San Mateo, Calif.-based Aryaka, the company’s […]

Read More

Board members CISOs

Board Members, CISOs Aren’t on the Same Page

October 5, 2022 Zachary Comeau Leave a Comment

Despite a global refocusing on cybersecurity priorities over the last few years, nearly half of board members at organizations across the globe feel unprepared to respond to a targeted cyberattack, and nearly two-thirds say they are at risk within the next 12 months, data which suggests a disconnect between boards of directors and CISOs. That […]

Read More

VMware EXSi security

State and Local Governments Struggle to Recover From Ransomware

October 4, 2022 Zachary Comeau Leave a Comment

While state and local governments see fewer ransomware attacks than other industry sectors, government organizations are more likely to have their data encrypted and are significantly less able to stop ransomware attacks before that step, according to cybersecurity company Sophos. The U.K.-based cybersecurity firm says 72% of state and local government organizations had their data […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 27
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.