• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Log4j, Older Vulnerabilities, CISA KEV

Make Sure These 15 Most Exploited Vulnerabilities From 2021 Are Patched

April 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with a coalition of U.S. and foreign security and law enforcement agencies, have released a list of the 15 most exploited vulnerabilities from 2021, calling on both public and private organizations to ensure these critical security bugs are mitigated and systems patched. The list, published in a […]

Read More

television tv stream smart broadcast video network

What to Look for in a Reliable Device Management Software

April 28, 2022 Nadav Avni Leave a Comment

For phone service companies—or “telcos”—aiming to expand their value-added services, maintaining a fleet of smart TVs and other devices is a given. The challenge became getting the right device management software to manage these smart devices properly. Meanwhile, not all electronics manufacturers who joined the smart TV bandwagon recognized the importance of developing their own […]

Read More

Progress MOVEit vulnerability

Sophos: Average 2021 Ransomware Payment Skyrockets to More Than $800,000

April 27, 2022 Zachary Comeau Leave a Comment

An alarming new report from U.K.-based cybersecurity company Sophos finds that both the amount of organizations hit with ransomware and the ransom paid are drastically increasing, with the average ransomware payment now not far off from reaching seven figures. The company’s State of Ransomware 2022 report, the results of a survey of 5,600 IT professionals […]

Read More

Atera ESET Integration

Microsoft Unveils New Antimalware Engine Capabilities for Linux and macOS

April 27, 2022 TD Staff Leave a Comment

Microsoft announced an upgrade to its next generation of protection on Linux and MacOs with a new Microsoft Defender Antivirus malware engine. The new antimalware engine brings machine learning, big-data analysis, in-depth threat research, and the Microsoft cloud infrastructure to protect devices (or endpoints) within organizations. The new antimalware engine in Microsoft Defender is currently […]

Read More

3CX Supply Chain Attack

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

April 27, 2022 Zachary Comeau Leave a Comment

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell. The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting […]

Read More

insider threats, military document leak, Jack Teixeira, insider risk

Insiders Pose Cybersecurity Threat to Healthcare

April 26, 2022 TD Staff Leave a Comment

The U.S. Department of Health and Human Services (HHS) Cybersecurity Program Office of Information Security warned healthcare facilities on Thursday about vulnerabilities to insider threats. HHS cited a 2020 study from Ponomon, which found that 61% of data breaches involving an insider are primarily unintentional, caused by negligent insiders. Nearly 14% of breaches, however, are […]

Read More

CISA Software Security

DHS’ First Bug Bounty Program Nets 122 Vulnerabilities

April 25, 2022 Zachary Comeau Leave a Comment

The U.S. Department of Homeland Security says its first bug bounty program, Hack DHS, has resulted in the disclosure of more than 120 vulnerabilities, and 27 of them were determined to be critical. The Department of Homeland Security (DHS) launched the agency’s first bug bounty program in December 2021 in an attempt to find and […]

Read More

Active Directory Misconfigurations

Common Active Directory Misconfigurations That Could Lead to Compromise

April 22, 2022 Zachary Comeau Leave a Comment

Cybersecurity services provider Mandiant has released its M-Trends 2022 report, based on data from the company’s investigations between October 2020 and the end of 2021, and it shows that while cyber defenses and techniques are improving, attackers are also continuing to adapt to new trends. Based on the company’s investigations, the report also outlines some […]

Read More

Cloudreach sunstone logo

Cloudreach Launches Sunstone to Enable Continuous Cloud Modernization

April 21, 2022 TD Staff Leave a Comment

Cloudreach, the London-based multi-cloud services provider announced the launch of Sunstone, a software platform designed to accelerate the modernization of in-cloud environments. Through the use of AI and machine learning technologies, Sunstone automates the continuous modernization of in-cloud applications to drive innovation, boost performance, increase security and reduce costs. Gartner Research forecasts that by 2025, […]

Read More

Microsoft Security RSA Conference

Microsoft Launches New Reporting Features for Device Control and Windows Defender Firewall

April 21, 2022 Zachary Comeau Leave a Comment

Microsoft is announcing new Endpoint reporting capabilities within the Microsoft 365 Defender portal that brings together Device Control reports and Windows Firewall reports so admins can see what is happening in their environment in just a few clicks. According to Microsoft, the reports are designed to give insight into device behavior and activity while allowing […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 49
  • Page 50
  • Page 51
  • Page 52
  • Page 53
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.