• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Google Cybersecurity Certificate

10 Common Cybersecurity Mistakes Your Organization is Making

May 23, 2022 Zachary Comeau Leave a Comment

With more of the world relying on technology to connect and maintain business continuity over the last two years, malicious cyber actors have stepped up their game to exploit weaknesses in organizations’ IT infrastructure and conduct a broad range of attacks against both public and private entities. However, network defenders and IT professionals can stop […]

Read More

3CX Supply Chain Attack

Watch Out For This Linux DDoS Trojan, Microsoft Says

May 23, 2022 Zachary Comeau Leave a Comment

Microsoft says it has observed a 254% increase in activity over the last six months from an eight-year-old Linux trojan targeting Linux-based operating systems on cloud infrastructures and IoT devices. The malware, called XorDdos, is named after its attack method, denial of service on Linux endpoints and servers, in addition to XOR-based encryption for its […]

Read More

CISA Software Security

Is Your IT Department Augmented by an MSP? Take These Cybersecurity Steps Now.

May 20, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and a host of other cybersecurity and law enforcement agencies are urging organizations to take steps to guard themselves against possible compromise of their managed service providers (MSP) as advanced threat actors and nation states are expected to up their attacks against those service providers. Attacking and […]

Read More

Department of Justice Ethical Hackers

DOJ Officially Revises Policy, Will Not Charge Ethical Hackers

May 20, 2022 Zachary Comeau Leave a Comment

The U.S. Department of Justice has officially revised its policy regarding ethical hackers, directing U.S. attorneys to not charge “good faith” security researchers who are accessing systems for testing and investigation purposes that ultimately result in a notice to the network owner of the vulnerability. The Department of Justice’s (DOJ) new policy immediately replaces a […]

Read More

VMware

Patch These Four VMware Vulnerabilities Immediately

May 19, 2022 Zachary Comeau Leave a Comment

Organizations are being urged to patch certain VMware products as threat actors are chaining a series of unpatched vulnerabilities in some of the company’s products to gain full system control, even as patches have been available for several weeks. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), threat actors, likely sophisticated groups, are […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Infosec Institute Launches Skills Roles To Outline Necessary Cybersecurity Training, Certifications

May 19, 2022 Zachary Comeau Leave a Comment

Cybersecurity education company Infosec Institute has launched Infosec Skills Roles, a set of pre-built training roadmaps aligned to what the company says are the 12 most in-demand cybersecurity roles to help organizations upskill and cross-train talent for open security positions. The new offering comes as the U.S. cybersecurity shortage remains north of half a million, […]

Read More

CIO, CISO cyber attack confidence

Half of Global CISOs Feel Unprepared to Cope with a Cyber Attack

May 18, 2022 TD Staff Leave a Comment

With the 2020 scramble to enable remote working, many CISOs have now come to terms with new ways of working. Many CISOs feel more in control of their environment: 48% feel that their organization is at risk of suffering a cyber attack within the next 12 months, down from 64% last year, according to Proofpoint’s […]

Read More

1Password Browser Extension

We’re Still Managing Passwords With Office Docs and Sticky Notes, Research Says

May 18, 2022 Zachary Comeau Leave a Comment

Despite compromised credentials leading to a majority of cyberattacks, almost half of IT and cybersecurity leaders say they still store passwords in shared office documents despite nearly all requiring password management and security training of their end users, according to new research from cybersecurity software provider Hitachi ID. The Calgary-based firm’s report found that 46% […]

Read More

Cryptojacking, Sysrv

Microsoft: Watch Out For This New Sysrv Botnet Varient

May 17, 2022 Zachary Comeau Leave a Comment

Microsoft is urging organizations to secure internet-facing systems, apply security updates and secure credentials after discovering a new variant of the Sysrv botnet, which is known for exploiting vulnerabilities in web apps and databases to install coin miners on Windows and Linux systems. In a series of tweets, the Redmond, Wash. IT giant says the […]

Read More

cybersecurity, vendor risk, third party vendor security risk

Syxsense Joins Microsoft Active Protections Program (MAPP)

May 17, 2022 TD Staff Leave a Comment

Aliso Viejo, Calif-based Syxsense, an IT and security management solutions provider, announced it has joined a group of cybersecurity software providers partnering with Microsoft to receive early vulnerability information through the Microsoft Active Protections Program (MAPP). The partnership further builds on Syxsense’s capabilities when helping customers scan, patch and secure endpoints. As a member of […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.