• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
MIcrosoft Entra External ID

Microsoft, Researchers Warn Of New Office Security Bug Being Exploited

May 31, 2022 Zachary Comeau Leave a Comment

Microsoft is urging administrators to apply a workaround for a remote code execution vulnerability in Microsoft Support Diagnostic Tool (MSDT) that exists when the tool is called using the URL protocol from a calling application such as Microsoft Word. According to Microsoft, attackers who successfully exploit the bug, tracked as CVE-2022-30190, can run arbitrary code […]

Read More

CISA Software Security

CISA Adds 75 Known Exploited Vulnerabilities to List, Including New Cisco Bug

May 27, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) within the last week has added more than 70 security flaws to its list of known exploited vulnerabilities that U.S. agencies must patch by a certain date, indicating a heightened danger if the bugs are left unpatched. CISA on Wednesday added 34 bugs to its catalog of […]

Read More

Microsoft Windows 11 Copilot

Microsoft to Roll Out Security Defaults to All Microsoft Customers

May 27, 2022 Zachary Comeau Leave a Comment

Microsoft has begun rolling out security defaults to existing Microsoft customers who have yet to roll out security defaults or Azure AD Conditional Access, helping tenants created before October 2019 better secure their IT environments. Microsoft introduced security defaults in the fall of 2019 for new tenants, which included multifactor authentication (MFA) and modern auth […]

Read More

Professional ChromeOS Administrator certification

Google Adds Security Integrations in Chrome; Cloud Enterprise Connectors Framework

May 27, 2022 TD Staff Leave a Comment

To help IT teams gain insights about potential security threats and events from Chrome, Google is launching the Chrome Enterprise Connectors Framework, a new set of plug-and-play integrations with security solution providers, such as Splunk, Palo Alto Networks and CrowdStrike. Google says the Chrome Enterprise Connectors Framework will help protect users when they navigate to […]

Read More

VMware Broadcom

Broadcom to Acquire VMware for $61 Billion

May 26, 2022 Zachary Comeau Leave a Comment

In one of the largest technology acquisitions ever recorded, semiconductor maker Broadcom is acquiring enterprise software solutions provider VMware in a cash-and-stock deal worth $61 billion. The Broadcom Software Group will rebrand and operate as VMware, and Broadcom’s existing infrastructure and security software will be included in that rebranded and expanded VMware group. According to […]

Read More

Microsoft Security RSA Conference

Microsoft Launches Public Preview of Access Reviews for Inactive Azure AD Users

May 26, 2022 Zachary Comeau Leave a Comment

Microsoft has released the public preview of access reviews for inactive users as part of Azure Active Directory (AD) Governance for organizations can take action to remove inactive accounts that could be leading to security risks. The feature is designed to help organizations deactivate accounts from former employees or contractors whose assignments have ended by […]

Read More

VMware EXSi security

Ransomware Continues to Disrupt Operational Technology Environments

May 25, 2022 TD Staff Leave a Comment

Ransomware will continue to disrupt operational technology (OT) environments amid the Russian invasion of Ukraine, according to the latest research from industrial cybersecurity firm Dragos. Researchers analyzed ransomware variants targeting industrial organizations worldwide and tracked ransomware information via public reports, and information uploaded or appearing on dark web resources. Dragos’ findings suggest even though the […]

Read More

Royal Ransomware

Verizon Report Suggests Ransomware Is Getting Worse

May 25, 2022 Zachary Comeau Leave a Comment

Despite a global focus on cybersecurity, increased pressure from law enforcement on cybercrime groups and a software industry that continues to rapidly innovate to solve security issues, ransomware continues its upward trajectory, rising as much in one year as it has over the past five years combined, according to Verizon’s 2022 Data Breach Investigations Report. […]

Read More

1Password Browser Extension

The Most Common Password Used Amongst CEOs

May 25, 2022 TD Staff Leave a Comment

The tech industry is one of the most breached sectors, according to the latest study by NordPass. The findings suggest high-level executives worldwide are still practicing poor password hygiene, as the most popular password remains “123456.” NordPass, in partnership with independent researchers analyzing cyber incidents, compiled a list of top passwords used by top-level executives. […]

Read More

Cybersecurity testing, penetration testing, cyber threats

MSSP Thrive Upgrades SOC With SOAR Integration

May 24, 2022 Zachary Comeau Leave a Comment

Thrive, a managed security services provider with more than 1,500 global customers, has upgraded their around-the-clock Security Operation Center with the integration of a Security Orchestration Automation and Response (SOAR) engine designed to enable the firms’ global security team to enhance its clients’ security. According to the company, the integration features tool aggregation and coordinated […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 45
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.