• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Microsoft Collaboration Cloud InfoComm Videoconferencing Education AI UCC Generative AI IT
Zoom Anthropic Claude AI Zoom IQ

Zoom to Launch Customer Managed Key for Security Compliance

August 31, 2022 Zachary Comeau Leave a Comment

Videoconferencing giant Zoom is launching Zoom Customer Managed Key (CMK), a new security offering designed to help customers address stricter compliance requirements and give them the ability to protect certain data stored within Zoom Cloud using their own encryption keys. According to Zoom, CMK is the company’s “newest advanced security offering.” The company says the […]

Read More

cybersecurity mesh architecture CSMA, ZTA

Building a Foundation for Zero Trust with Cybersecurity Mesh

August 31, 2022 Wes Wright Leave a Comment

It seems like there are more acronyms, labels and methods for bolstering security than ever before – and making sense of them all is proving to be just as complex as the infrastructure they’re meant to secure. One widely embraced term, zero-trust architecture (ZTA), calls for continually vetting users as they access different applications and […]

Read More

VMware DEX

What’s New From VMware From VMware Explore 2022

August 31, 2022 Zachary Comeau Leave a Comment

VMware has announced several new products and innovations during its VMware Explore 2022 event this week, including new offerings to help customers navigate multi-cloud environments, advanced automation to ease hybrid work implementations, cloud and edge infrastructure and much more. New products announced during the show include vSphere 8, VMware vSAN 8, VMware Cloud Foundation+, VMware […]

Read More

Proofpoint CISO, CISOs cyberattack

Notorious Russian Hacking Group Has A New Trick to Maintain Persistence

August 30, 2022 Zachary Comeau Leave a Comment

Microsoft says it has uncovered a tactic used by Russia-aligned threat actors that is used to maintain persistence access to compromised environments after leveraging an Active Directory Federation Services (AD FS) server. In a lengthy blog post, Microsoft details how NOBELIUM—the codename attached to the same threat group that leveraged the SolarWinds Orion platform and […]

Read More

CISA Software Security

CISA Warns of Quantum Computing Vulnerabilities

August 29, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new guide that outlines the actions critical infrastructure stakeholders should take now to prepare for their future migration to the post-quantum cryptographic standard that the National Institute of Standards and Technology (NIST) will publish in 2024. In the guide, CISA says both the public […]

Read More

cybersecurity Proofpoint compliance

Proofpoint Launches Intelligent Compliance Platform

August 26, 2022 TD Staff Leave a Comment

Proofpoint, the Sunnyvale, Calif., cybersecurity and compliance company launched an intelligent compliance platform, offering enterprises regulatory compliance safeguards while simplifying corporate legal protection practices. The platform leverages Proofpoint’s proprietary machine learning engine to provide business leaders with AI powered collection, clarify classification, detection, prevention, search, e-discovery, supervision and next gen predictive analytics while meeting complex […]

Read More

LastPass Breach, Hack

LastPass Confirms Security Incident

August 26, 2022 Alyssa Borelli Leave a Comment

LastPass, the Boston-based cloud security password and identity management solutions provider confirms it has detected unusual activity within portions of its development environment. No customer data or encrypted password vaults were compromised, according to the company. The unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and […]

Read More

This Week in IT, IT News, Microsoft, Google, Dell

This Week in IT: Microsoft Teams for Education Updates, Ransomware Attacks Spike, Organizations Impacted by Nation State Cyber Attacks

August 25, 2022 Alyssa Borelli Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. Microsoft Teams for Education Gets a new […]

Read More

Spectrum Enterprise, Cisco

How to Implement a Third-Party Cyber Risk Management Program

August 24, 2022 Sarah Frazier Leave a Comment

The COVID-19 pandemic introduced swift digital changes that created further security vulnerabilities for a hybrid workforce. Due to the distributed nature of modern work environments, businesses must be on the lookout for ways that cybercriminals can expose new vulnerabilities. In today’s economy, the need to construct a third-party cyber risk management program  (TPCRM) program for […]

Read More

password manager, Hitachi ID, HYPR, Bravura OneAuth, passwordless

Hitachi ID and HYPR Accelerate Path to Passwordless Future

August 22, 2022 TD Staff Leave a Comment

Credentials are the most popular targets of hackers, who are only growing more sophisticated in their ability to automate attacks that bypass traditional forms of multi-factor authentication. Organizations are stuck between having their security teams add increasing complexity in a race to protect credentials and a user experience getting progressively cumbersome. Hitachi ID has partnered […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.