• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
MIcrosoft Entra External ID

Prepare: Microsoft Begins Disabling Basic Auth in Exchange Online Oct. 1

June 30, 2022 Zachary Comeau Leave a Comment

Microsoft and U.S. cybersecurity officials renewing calls for organizations to switch from Basic Authentication (Basic Auth) in Microsoft Exchange Online to Modern Authentication before the company begins to disable Basic Auth in October. Microsoft on Oct. 1 will begin turning off the ability to use Basic Auth in Exchange Online for Exchange ActiveSync (EAS), POP, […]

Read More

Microsoft 365 domain, cloud.microsoft

Microsoft Rolling Out Idle Session Timeout for Microsoft 365 Web Apps

June 29, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new feature that will automatically log users out of Microsoft 365 web apps after a period of inactivity, helping admins protect the organization’s data when users log on from unmanaged shared or personal devices. According to Microsoft, the idle session timeout feature for web apps allows admins to configure a tenant-wide […]

Read More

Cyber technology security lock on screen, network protection

Why Security Technology Convergence is Crucial to Future-Proofing the Workplace

June 28, 2022 Andi Krebs Leave a Comment

Today’s commercial technology stacks are increasingly leveraging IoT and the cloud to make managing businesses more efficient: people are more reliant on technology in order to use, access, and manage their offices. This trend holds true for workplace security systems, too. Now, we’re seeing higher mobile credential adoption for commercial access control systems, increased migration […]

Read More

Microsoft Fortra healthcare ransomware

WatchGuard: Ransomware on Pace for Record Year

June 28, 2022 Zachary Comeau Leave a Comment

Despite increased law enforcement pressure on the ransomware industry and an IT community that has never been more aware of the ransomware threat, ransomware detections had already doubled the total number of detections for all of 2021 in just the first quarter, according to a new report from WatchGuard Technologies. The cybersecurity firm’s researchers say […]

Read More

Microsoft Defender for APIs

Microsoft Releases Security Posture Management for Defender for Cloud Apps

June 27, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new security posture management tool for Defender for Cloud Apps to help organizations protect their cloud apps as organizations continue to adopt cloud-native software-as-a-service applications to meet their changing needs. The public preview of SaaS Security Posture Management in Microsoft Defender for Cloud Apps is designed to help IT teams view, […]

Read More

Microsoft Security RSA Conference

Microsoft Reminds Users That it is Ending Support for Windows 8.1 in January 2023

June 27, 2022 Zachary Comeau Leave a Comment

For the few organizations and use cases where Windows 8.1 is still in use, IT professionals should begin immediately planning an upgrade to Windows 10 or 11, as Microsoft’s support for Windows 8.1 will end in January 2023. On Jan. 10, 2023, those running Windows 8.1 and Microsoft 365 will continue to function, but they […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Log4Shell Exploitation Continues, Agencies Warn

June 24, 2022 Zachary Comeau Leave a Comment

More than six months after the Log4Shell vulnerability was discovered in the widely used Java logger Log4j, cybersecurity agencies are warning of the continued exploitation of the bug in unpatched VMWare Horizon and Unified Access Gateway servers. The U.S. Cybersecurity and Infrastructure Agency (CISA), along with the U.S. Coast Guard Cyber Command (CGCYBER), say malicious […]

Read More

1Password Browser Extension

Microsoft Releases Temporary Access Pass For Time-Limited Passcodes

June 24, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing the general availability of Temporary Access Pass, a time-limited passcode that allows users to register passwordless authentication methods and recover access to accounts without a password. According to Microsoft, Temporary Access Pass (TAP) can also be used to set up Windows devices whether users are directly setting up their own devices or […]

Read More

Tenable Splunk

Critical Vulnerabilities Found in Popular Access Control Panels

June 23, 2022 TD Staff Leave a Comment

Silicon Valley, Calif.-based cybersecurity firm Trellix recently announced it discovered four zero-day vulnerabilities in HID Global Mercury access control panels, as well as four previously patched vulnerabilities that were not publicly disclosed. The firm says the impact of these vulnerabilities is full system control, including the ability for an attacker to remotely manipulate door locks. […]

Read More

Expel MDR for Kubernetes, cloud

Johnson Controls Acquires Tempered Networks to Boost Cybersecurity

June 23, 2022 TD Staff Leave a Comment

Johnson Controls says it has acquired zero trust cybersecurity provider Tempered Networks. Financial terms of the transaction were not disclosed. Based in Seattle, Tempered Networks has created ‘Airwall’ technology, an advanced self-defense system for buildings that is said to enable secure network access across diverse groups of endpoint devices, edge gateways, Cloud platforms and service technicians. It […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 41
  • Page 42
  • Page 43
  • Page 44
  • Page 45
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.