• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Cyber technology security lock on screen, network protection

Why Security Technology Convergence is Crucial to Future-Proofing the Workplace

June 28, 2022 Andi Krebs Leave a Comment

Today’s commercial technology stacks are increasingly leveraging IoT and the cloud to make managing businesses more efficient: people are more reliant on technology in order to use, access, and manage their offices. This trend holds true for workplace security systems, too. Now, we’re seeing higher mobile credential adoption for commercial access control systems, increased migration […]

Read More

Microsoft Fortra healthcare ransomware

WatchGuard: Ransomware on Pace for Record Year

June 28, 2022 Zachary Comeau Leave a Comment

Despite increased law enforcement pressure on the ransomware industry and an IT community that has never been more aware of the ransomware threat, ransomware detections had already doubled the total number of detections for all of 2021 in just the first quarter, according to a new report from WatchGuard Technologies. The cybersecurity firm’s researchers say […]

Read More

Microsoft Defender for APIs

Microsoft Releases Security Posture Management for Defender for Cloud Apps

June 27, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new security posture management tool for Defender for Cloud Apps to help organizations protect their cloud apps as organizations continue to adopt cloud-native software-as-a-service applications to meet their changing needs. The public preview of SaaS Security Posture Management in Microsoft Defender for Cloud Apps is designed to help IT teams view, […]

Read More

Microsoft Security RSA Conference

Microsoft Reminds Users That it is Ending Support for Windows 8.1 in January 2023

June 27, 2022 Zachary Comeau Leave a Comment

For the few organizations and use cases where Windows 8.1 is still in use, IT professionals should begin immediately planning an upgrade to Windows 10 or 11, as Microsoft’s support for Windows 8.1 will end in January 2023. On Jan. 10, 2023, those running Windows 8.1 and Microsoft 365 will continue to function, but they […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Log4Shell Exploitation Continues, Agencies Warn

June 24, 2022 Zachary Comeau Leave a Comment

More than six months after the Log4Shell vulnerability was discovered in the widely used Java logger Log4j, cybersecurity agencies are warning of the continued exploitation of the bug in unpatched VMWare Horizon and Unified Access Gateway servers. The U.S. Cybersecurity and Infrastructure Agency (CISA), along with the U.S. Coast Guard Cyber Command (CGCYBER), say malicious […]

Read More

1Password Browser Extension

Microsoft Releases Temporary Access Pass For Time-Limited Passcodes

June 24, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing the general availability of Temporary Access Pass, a time-limited passcode that allows users to register passwordless authentication methods and recover access to accounts without a password. According to Microsoft, Temporary Access Pass (TAP) can also be used to set up Windows devices whether users are directly setting up their own devices or […]

Read More

Tenable Splunk

Critical Vulnerabilities Found in Popular Access Control Panels

June 23, 2022 TD Staff Leave a Comment

Silicon Valley, Calif.-based cybersecurity firm Trellix recently announced it discovered four zero-day vulnerabilities in HID Global Mercury access control panels, as well as four previously patched vulnerabilities that were not publicly disclosed. The firm says the impact of these vulnerabilities is full system control, including the ability for an attacker to remotely manipulate door locks. […]

Read More

Expel MDR for Kubernetes, cloud

Johnson Controls Acquires Tempered Networks to Boost Cybersecurity

June 23, 2022 TD Staff Leave a Comment

Johnson Controls says it has acquired zero trust cybersecurity provider Tempered Networks. Financial terms of the transaction were not disclosed. Based in Seattle, Tempered Networks has created ‘Airwall’ technology, an advanced self-defense system for buildings that is said to enable secure network access across diverse groups of endpoint devices, edge gateways, Cloud platforms and service technicians. It […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Adds New App Security Features to Prisma Cloud

June 23, 2022 Zachary Comeau Leave a Comment

To help organizations manage and secure complex cloud environments, cybersecurity giant Palo Alto Networks is adding Out-of-Band Web Application and API Security to its Prisma Cloud platform. According to the Santa Clara, Calif.-based company, the addition of Out-of-Band Web Application and API Security (Out-of-Band WAAS) is designed to help organizations secure web applications with maximum […]

Read More

3CX Hack Supply Chain attack compromise

IT Security Experts Should Pay Close Attention To What’s Happening in Ukraine

June 22, 2022 Zachary Comeau Leave a Comment

If the last few years are any indication, cybercriminals will continue adopting new tactics and techniques to find ways past our network defenses, and that was on display in full force at RSA Conference earlier this month, where cybersecurity experts shared what they’re seeing in the wild. The annual cybersecurity conference was held at a […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 41
  • Page 42
  • Page 43
  • Page 44
  • Page 45
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.