• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Bitwarden Passwordless.dev

Bitwarden Launches Passwordless.dev to Simplify Passkey Implementation

May 19, 2023 Zachary Comeau Leave a Comment

Open-source password manager Bitwarden is launching the general availability of Bitwarden Passwordless.dev, a developer toolkit with an API for integrating FIDO2 WebAuthn-based passkeys into consumer websites and enterprise applications. Bitwarden’s release comes as tech firms are investing heavily in passwordless technologies in the hopes that it will essentially eliminate a major vector of cyberattacks and […]

Read More

Passage by 1password App dashboard

Passage by 1Password Brings Passkeys to Any Website

May 18, 2023 TD Staff Leave a Comment

1Password, the Toronto-based, provider of  human-centric security and privacy, launched Passage by 1Password, a standalone authentication solution designed to enable businesses to implement passkeys for apps and websites. According to the company, Passage by 1Password allows businesses to eliminate the hassle of passwords and reduce cart abandonment without building their own authentication infrastructure. With this […]

Read More

Zerto 10, ransomware

Zerto Launches Zerto 10 for Enhanced Disaster Recovery, Ransomware Mitigation

May 18, 2023 Zachary Comeau Leave a Comment

Disaster recovery and ransomware resilience firm Zerto is launching Zerto 10 for Microsoft Azure, a new disaster recovery solution designed to enhance disaster recovery and mobility for complete infrastructure flexibility. The company also unveiled new real-time encryption and detection features and a new air-gapped recovery vault to help mitigate a ransomware attack. According to the […]

Read More

Microsoft Teams attack

Research: Microsoft Teams Can Be Used for Malware Delivery

May 18, 2023 Zachary Comeau Leave a Comment

It is common knowledge that Azure, PowerShell, Exchange and other Microsoft Tools and services are popular targets of threat actors, but Microsoft Teams is emerging as one of the most targeted Microsoft applications for attackers. According to enterprise security firm Proofpoint, Microsoft Teams is now one of the 10 most targeted sign-in applications, with nearly […]

Read More

SASE, SASE approaches, SASE implementation

SASE Adoption and Different Approaches to Implementation

May 17, 2023 Zachary Comeau Leave a Comment

With employees accessing corporate resources and logging on from anywhere, organizations are now shifting to a secure access service edge (SASE) approach to deliver converged network and security-as-a-service designed to support branch offices, remote and on-premises secure access use cases. According to Gartner, SASE includes SD-WAN, SWG, CASB, NGFW and enables zero trust access based […]

Read More

MOVEit, ransomware, CVE-2023-34362,

BianLian Ransomware Group Skips Encryption and Goes Straight to Exfiltration

May 17, 2023 Zachary Comeau Leave a Comment

Cybersecurity officials the, FBI, Microsoft and Sophos are warning organizations to limit their use of some legitimate tools as they are being leveraged by the BianLian group, a ransomware group that has targeted organizations with a data extortion model, bypassing the need to encrypt victims’ data. According to a joint advisory from CISA, its Australian […]

Read More

Zero Trust, Leostream, AWS

Leostream Announces ZTNA Platform for AWS

May 16, 2023 Zachary Comeau Leave a Comment

Remote desktop access provider Leostream is launching a federated identity management solution with Zero Trust Network Access (ZTNA) for AWS. According to the Boston-based firm, its is launching federated identity management with ZTNA for secure remote computing designed to protect and connect users across virtual desktop infrastructure, desktops-as-a-service and end-user applications in AWS environments. The […]

Read More

Garter infrastructure trends. Data center concept based isometric design, illustration of main server connected with cloud server on glossy blue background.

These Four Trends Are Shaping the Future of IT Infrastructure

May 16, 2023 TD Staff Leave a Comment

Gartner highlighted four trends impacting cloud, data center and edge infrastructure in 2023, as infrastructure and operations (I&O) teams pivot to support new technologies and ways of working during a year of economic uncertainty. Speaking at the Gartner IT Infrastructure, Operations & Cloud Strategies Conference in Sydney, Paul Delory, VP Analyst at Gartner said, “In […]

Read More

Proofpoint CISO, CISOs cyberattack

CISOs Are Less Confident in Their Organization’s Security in 2023

May 16, 2023 Zachary Comeau Leave a Comment

The pandemic introduced an entirely new way of working that delighted many end users, but IT departments and cybersecurity professionals had their work cut out for them as they were required to deploy, manage and secure technologies designed to support distributed work. That shift to distributed work resulted in new cyberattack vectors that had even […]

Read More

VMware EXSi security

CrowdStrike: VMware ESXi in the RaaS Crosshairs

May 15, 2023 Zachary Comeau Leave a Comment

Cyberattacks are continuing to target VMware ESXi vSphere hypervisors, with cybersecurity firm CrowdStrike reporting today that ransomware-as-a-service (RaaS) platforms are increasingly being leveraged to deploy Linux versions of ransomware tools. According to the cybersecurity giant, these tools are specifically designed to affect VMware’s ESXi vSphere hypervisor. The company’s research into these kind of attacks date […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.