• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud Software Videoconferencing AI UCC Automation IT Security Cloud Computing
Tenable.ot

Top Cybersecurity and Risk Predictions

July 8, 2022 TD Staff Leave a Comment

Gartner’s cybersecurity experts gathered in Sydney last week for Gartner’s Security & Risk Management Summit to discuss what security and risk management leaders need to do to be successful in the digital era. Richard Addiscott, Gartner’s senior director analyst, in a statement, “We can’t fall into old habits and try to treat everything the same […]

Read More

Microsoft Windows 11 Copilot

Microsoft Releases Entra Permissions for Multicloud Identity Management

July 7, 2022 Zachary Comeau Leave a Comment

Microsoft has released the general availability of Permissions Management for Microsoft Entra, a new standalone solution designed to allow organizations to discover, remediate and monitor permissions for all identities and resources across multicloud environments. According to the company, Microsoft Entra Permissions Management allows admins to enforce the principle of least privilege at cloud scale using […]

Read More

Microsoft Apple macOS bug

Apple to Introduce Lockdown Mode to Help Protect Against Spyware

July 7, 2022 Zachary Comeau Leave a Comment

Apple is previewing Lockdown Mode, a new security capability coming this fall with a slate of new operating systems designed to harden device defenses and severely limit functionalities of devices that could be exploited by sophisticated spyware, such as solutions from NSO Group and other private spyware providers. According to Apple, Lockdown Mode is intended […]

Read More

Cybersecurity Board

Cyber Literacy Test: 7 Questions to Ask Your Board to Reduce Risk and Educate Leaders in the Age of Attacks

July 7, 2022 Naveen Bhateja Leave a Comment

As corporations consider their cybersecurity weaknesses, the focus often falls on unsecured networks, outdated systems, or a lack of monitoring designed to detect attacks. One area that is rarely identified, but that can significantly threaten a corporation’s ability to prevent, manage, and respond to cyber attacks, is the cyber literacy of the corporation’s board. Every […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

Microsoft Security RSA Conference

Microsoft is Making it Easier to Tune Defender Alerts

July 5, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing the public preview of a new alert suppression experience in Microsoft Defender that addresses alert fatigue and helps cybersecurity professionals better triage and resolve alerts. The new alert suppression experience is designed to provide tighter control and granularity, allowing users to tune Microsoft Defender for Endpoint alerts and manage alerts in advance […]

Read More

Google, Bard

Google Updates Password Manager For Unified Experience

July 1, 2022 Zachary Comeau Leave a Comment

Google is starting to roll out new updates to Google Password Manager that help users make it easier to remember their passwords, including a new unified management experience that is the same across Chrome and Android. According to Google, the updates come as a result of feedback from its users about how confusing it can […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Microsoft Adds New Expert-level Cybersecurity Architect Certification

July 1, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new expert-level certification for cybersecurity architects that certifies a technology professional can design and evolve their organization’s cybersecurity strategy. The Microsoft Certified: Cybersecurity Architect Expert certification, now available, will also certify that an IT professional can design a zero-trust and strategy architecture, evaluate governance risk compliance technical and security operations strategies, […]

Read More

MIcrosoft Entra External ID

Prepare: Microsoft Begins Disabling Basic Auth in Exchange Online Oct. 1

June 30, 2022 Zachary Comeau Leave a Comment

Microsoft and U.S. cybersecurity officials renewing calls for organizations to switch from Basic Authentication (Basic Auth) in Microsoft Exchange Online to Modern Authentication before the company begins to disable Basic Auth in October. Microsoft on Oct. 1 will begin turning off the ability to use Basic Auth in Exchange Online for Exchange ActiveSync (EAS), POP, […]

Read More

Microsoft 365 domain, cloud.microsoft

Microsoft Rolling Out Idle Session Timeout for Microsoft 365 Web Apps

June 29, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new feature that will automatically log users out of Microsoft 365 web apps after a period of inactivity, helping admins protect the organization’s data when users log on from unmanaged shared or personal devices. According to Microsoft, the idle session timeout feature for web apps allows admins to configure a tenant-wide […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 40
  • Page 41
  • Page 42
  • Page 43
  • Page 44
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.