• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Vulnerability Dahua ONVIF

Vulnerability Discovered in Dahua’s ONVIF Implementation

August 5, 2022 TD Staff Leave a Comment

Cybersecurity firm Nozomi Networks recently revealed it had discovered a new vulnerability affecting the implementation of an Open Network Video Interface Forum (ONVIF) authentication mechanism in some IP cameras developed by Dahua Technology. According to a blog post by the cyber experts, this vulnerability could be abused by attackers to compromise Dahua network cameras by sniffing a […]

Read More

3CX Hack Supply Chain attack compromise

These are the Top 11 Malware Strains Observed in 2021

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Netskope Launches Borderless WAN Offering With New Acquisition

August 5, 2022 Zachary Comeau Leave a Comment

Cloud security and SASE firm Netskope says it is launching a new Borderless WAN offering after acquiring Infiot, which it calls a pioneer in secure, reliable access with zero trust security, network and application optimization and AI-driven operations. The Santa Clara, Calif.-based Netskope says the addition of Infiot’s technology as Netskope Borderless WAN will enable […]

Read More

SolarWinds IT Pro Day

This Week in IT: Teams and Apple Silicon, Cloud Leaders, VMware and Cisco Patches

August 4, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Teams on Macs with Apple silicon Microsoft will be rolling out […]

Read More

router vulnerabilities security flaws

Router Security Flaws Surge to Record Heights

August 4, 2022 TD Staff Leave a Comment

With the rise of remote work, routers are gaining more attention. Remote work opens the possibility for hackers to breach corporate security by abusing old and unpatched home routers, according to Atlas VPN. Router flaws may expose individuals and corporate networks to cybersecurity dangers such as hacking, data breaches, financial fraud, industrial espionage and others. […]

Read More

Software Vendor Trust

How to Vet a Vendor’s Transparency and Trustworthiness

August 4, 2022 Zachary Comeau Leave a Comment

Has your organization ever found out about a technology vendor’s security incident from news reports rather than a transparent disclosure to customers from the vendor itself? If so, and that vendor has not profusely apologized for not disclosing that incident, then it may be time to cut bait with that particular provider. That is especially […]

Read More

Digital Workflow

How to Win at Cybersecurity: Become a “Sneaker” CISO

August 4, 2022 Tony Carothers Leave a Comment

To protect against cybercrime, every organization needs to build a culture of information security. To do that, infosec leaders need to become “sneaker CISOs.” There are three elements to security: Technology, people and processes. Sneaker CISOs are more focused on people and process than on technology. Too many security professionals today are so deep into […]

Read More

Microsoft Security RSA Conference

Microsoft Launches Defender Experts for Hunting

August 3, 2022 Zachary Comeau Leave a Comment

Microsoft is helping organizations add to their security operations center’s threat hunting capabilities with Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint. According to Microsoft, experts will hunt for suspicious activity across endpoints, Office 365, cloud app and identities, and hand off that contextual alert […]

Read More

Atlas VPN: Ransomware Hackers Take 30+ Terabytes of Data in 2022

August 3, 2022 TD Staff Leave a Comment

Ransomware hackers have stolen over 30 terabytes (TB) of personal and other sensitive data throughout more than 300 attacks in 2022, according to researchers at Atlas VPN. The team analyzed 623 ransomware incidents across the EU, the United Kingdom and the United States for a reporting period from May 2021 to June 2022. In January, […]

Read More

Home Office Cybersecurity security

5 Tech Security Ideas for Creating a Safe Home Office

August 2, 2022 Kate Jones Leave a Comment

Working from home can create a great sense of freedom and flexibility, but it comes with its challenges. When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed for optimal protection. Should someone hack into your home office or Wi-Fi network, your computer and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.