• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
Microsoft macros

Microsoft Temporarily Rolls Back Default Office VBA Macros Blocking

July 11, 2022 Zachary Comeau Leave a Comment

Update July 11: In an update to the original blog post announcing the blocking of VBA macros by default, Microsoft said the rollback is temporary while additional changes are made to enhance visibility.  “This is a temporary change, and we are fully committed to making the default change for all users,” Microsoft says in the […]

Read More

Malwarebytes Mobile Security for Business

Atera Launches New Malwarebytes Integration

July 8, 2022 Zachary Comeau Leave a Comment

Remote monitoring and IT management provider Atera now offers a new integration with anti-malware provider Malwarebytes to automate licensing and provisioning of the company’s OneView platform to help streamline and maximize security operations. The integration will effectively allow users to deploy Malwarebytes products directly through Atera’s remote monitoring and management platform, giving customers access to […]

Read More

Tenable.ot

Top Cybersecurity and Risk Predictions

July 8, 2022 TD Staff Leave a Comment

Gartner’s cybersecurity experts gathered in Sydney last week for Gartner’s Security & Risk Management Summit to discuss what security and risk management leaders need to do to be successful in the digital era. Richard Addiscott, Gartner’s senior director analyst, in a statement, “We can’t fall into old habits and try to treat everything the same […]

Read More

Microsoft Windows 11 Copilot

Microsoft Releases Entra Permissions for Multicloud Identity Management

July 7, 2022 Zachary Comeau Leave a Comment

Microsoft has released the general availability of Permissions Management for Microsoft Entra, a new standalone solution designed to allow organizations to discover, remediate and monitor permissions for all identities and resources across multicloud environments. According to the company, Microsoft Entra Permissions Management allows admins to enforce the principle of least privilege at cloud scale using […]

Read More

Microsoft Apple macOS bug

Apple to Introduce Lockdown Mode to Help Protect Against Spyware

July 7, 2022 Zachary Comeau Leave a Comment

Apple is previewing Lockdown Mode, a new security capability coming this fall with a slate of new operating systems designed to harden device defenses and severely limit functionalities of devices that could be exploited by sophisticated spyware, such as solutions from NSO Group and other private spyware providers. According to Apple, Lockdown Mode is intended […]

Read More

Cybersecurity Board

Cyber Literacy Test: 7 Questions to Ask Your Board to Reduce Risk and Educate Leaders in the Age of Attacks

July 7, 2022 Naveen Bhateja Leave a Comment

As corporations consider their cybersecurity weaknesses, the focus often falls on unsecured networks, outdated systems, or a lack of monitoring designed to detect attacks. One area that is rarely identified, but that can significantly threaten a corporation’s ability to prevent, manage, and respond to cyber attacks, is the cyber literacy of the corporation’s board. Every […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

Microsoft Security RSA Conference

Microsoft is Making it Easier to Tune Defender Alerts

July 5, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing the public preview of a new alert suppression experience in Microsoft Defender that addresses alert fatigue and helps cybersecurity professionals better triage and resolve alerts. The new alert suppression experience is designed to provide tighter control and granularity, allowing users to tune Microsoft Defender for Endpoint alerts and manage alerts in advance […]

Read More

Google, Bard

Google Updates Password Manager For Unified Experience

July 1, 2022 Zachary Comeau Leave a Comment

Google is starting to roll out new updates to Google Password Manager that help users make it easier to remember their passwords, including a new unified management experience that is the same across Chrome and Android. According to Google, the updates come as a result of feedback from its users about how confusing it can […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Microsoft Adds New Expert-level Cybersecurity Architect Certification

July 1, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new expert-level certification for cybersecurity architects that certifies a technology professional can design and evolve their organization’s cybersecurity strategy. The Microsoft Certified: Cybersecurity Architect Expert certification, now available, will also certify that an IT professional can design a zero-trust and strategy architecture, evaluate governance risk compliance technical and security operations strategies, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 40
  • Page 41
  • Page 42
  • Page 43
  • Page 44
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.