• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cybersecurity Microsoft Access Control Hybrid Work Patch management Vulnerability IoT UCC IT management Log4j
Zero Trust, ZTNA, Blackberry

BlackBerry Launches Zero Trust Network Access Solution with CylanceGATEWAY

June 10, 2022 TD Staff Leave a Comment

Security software and services provider BlackBerry Limited unveiled a new zero trust network access (ZTNA) as-service with CylanceGATEWAY. The new service is designed to securely enable remote workers and prevent malicious threat actors from compromising corporate networks using advanced AI-driven cybersecurity. Available to customers globally from July 2022, CylanceGATEWAY will provide businesses of all sizes […]

Read More

healthcare ransom payment cybersecurity

Foundational Tips for Fighting Healthcare’s Top Cyberthreats

June 9, 2022 Tom Neclerio Leave a Comment

In 2021 alone, the healthcare industry saw a 123% increase in ransomware attacks and sensitive data breaches likely as a result of the pandemic. It is of no surprise that cyberattacks have only continued to escalate and intensify across healthcare institutions – further destabilizing the medical field, adding to concerns among patients, and creating more […]

Read More

10 Cybersecurity Mistakes, cybersecurity mandiant partner alliance

Mandiant Launches Cyber Alliance Program

June 8, 2022 TD Staff Leave a Comment

Mandiant, Inc. launched a Cyber Alliance Program to help further the company’s mission to make organizations secure from cyber threats through unique and sophisticated strategic partnerships that create enhanced solutions for customers around the globe. The Cyber Alliance Program is open to cyber security technology partners across sectors such as endpoint, network, identity and authentication, […]

Read More

cybersecurity hiring, cyber job postings increases

CyberSeek: Cybersecurity Hiring Momentum Ramps Up

June 8, 2022 TD Staff Leave a Comment

The search for cybersecurity talent continues to accelerate across the U.S. economy, with cyber job postings growing at more than twice the rate of today’s overheated job market, according to new data from CyberSeek, a joint initiative between the National Initiative for Cybersecurity Education (NICE), Emsi Burning Glass and CompTIA. U.S. employers deployed 714,548 job […]

Read More

LastPass Passwordless

LastPass Launches Passwordless Login to Vault

June 7, 2022 Zachary Comeau Leave a Comment

Password management provider LastPass is launching a new secure passwordless login to the LastPass vault via the LastPass Authenticator, creating a passwordless password manager, which the company says is a first for the security industry. The Boston, Mass.-based company says the launch of passwordless login comes as the company is committed to a standards-based FIDO-supported […]

Read More

Cisco Live

Cisco Unveils New Security Cloud Strategy

June 7, 2022 TD Staff Leave a Comment

Cisco unveiled its plan for a global, cloud-delivered, integrated platform that secures and connects organizations of any shape and size at today’s RSA Conference. Cisco Security Cloud is designed to be the “industry’s most open platform, protecting the integrity of the entire IT ecosystem—without public cloud lock-in,” says Cisco. Cisco Security Cloud is expected provide […]

Read More

CISO, Log4shell, Log4j

Should Log4Shell Still Keep CISOs Up at Night?

June 7, 2022 Dan Murphy Leave a Comment

In December 2021, the Apache Software Foundation disclosed that the popular Log4j framework contained a critical vulnerability that allowed remote code execution (RCE).  It caused a security earthquake, keeping many CISOs up at night. The aftershocks are still felt. The vulnerability, known as Log4Shell, was extremely easy to exploit. Put simply, it allowed any malicious […]

Read More

electronic design, SBOM

Static SBOMs vs Dynamic SBOMs

June 6, 2022 Liran Tancman Leave a Comment

Since the federal government mandate calling for the creation of a software bill of materials (SBOM) to avoid the next SolarWinds or Log4j exposures, software providers have been scrambling to figure out how to create SBOMs that are both effective and dynamic, given that software changes over time. Bills of material have long been standard […]

Read More

Atlassian Confluence,

Take Action Now: Critical Zero Day Discovered in Atlassian Confluence

June 6, 2022 Zachary Comeau Leave a Comment

Editor’s note: This post has been modified with an updated security advisory and mitigation tips from Atlassian following a critical vulnerability first reported on June 3, 2022.  Security researchers say a new critical zero-day vulnerability in all supported versions of Atlassian Confluence is being actively exploited to deploy webshells, and admins are being urged to […]

Read More

HackerOne OpenASM

HackerOne Launches New Initiative to Extend Value of Attack Surface Management Tools

June 2, 2022 Zachary Comeau Leave a Comment

Attack resistance management provider HackerOne is launching a new initiative, OpenASM, designed to combine scan data from multiple vendors so customers can strengthen penetration testing and bounty efforts. According to the company, this can also help ethical hackers enrich, risk rank and prioritize assets. HackerOne Assets, a new attack resistance management (ASM) product, is the […]

Read More

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Interim pages omitted …
  • Go to page 144
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.