• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
MIcrosoft Entra External ID

Microsoft to Completely End SMB1 Protocol in Windows

April 20, 2022 Zachary Comeau Leave a Comment

Microsoft is beginning the final phase of disabling SMB1 in Windows, announcing that SMB1 is now disabled by default for Windows 11 Home Insiders, and the company will remove the SMB1 binaries and the drivers and DLLs of SMB1 in future releases. In a Tech Community blog, Ned Pyle, a principal program manager in the […]

Read More

Nordlocker for Business

NordLocker Launches Encrypted Cloud Storage for Business

April 20, 2022 TD Staff Leave a Comment

NordLocker, the encrypted cloud storage service provider has launched a business product to offer organizations around the world protection of their corporate data. Nord Security, parent company of NordLocker, introduced NordLocker’s file encryption tool in 2019. Since then, it has undergone many development phases and  is “…now positioned as an end-to-end encrypted cloud storage option […]

Read More

Lenovo Firmware Bugs

More Than 100 Lenovo Laptops Vulnerable to Firmware Bugs

April 20, 2022 Zachary Comeau Leave a Comment

Security researchers have discovered three Unified Extensible Firmware Interface vulnerabilities impacting more than 100 different models of Lenovo consumer laptops that could allow attackers to deploy and execute malware. According to Slovakia-based cybersecurity firm ESET, two of the discovered firmware bugs affect UEFI firmware drivers originally designed to only be used during the manufacturing process […]

Read More

Proofpoint CISO, CISOs cyberattack

Hackers Adapting Despite Improved Detection, Mandiant Says

April 19, 2022 Zachary Comeau Leave a Comment

Although the IT software supply chain and the technologists tasked with using those tools to keep organizations safe from cyberattacks continue to innovate, hackers are also adapting their techniques to target and infiltrate organizations’ IT environments, according to cybersecurity firm Mandiant’s M-Trends report. The company’s M-Trends 2022 report, based on investigational metrics between Oct. 1 […]

Read More

Google Cybersecurity Certificate

More than 75% Of Organizations Say They’ll Be Attacked In Next 12 Months

April 19, 2022 Zachary Comeau Leave a Comment

More than three-quarters of organizations believe they’ll be successfully attacked over the next year as the cyber risk level continues to rise, according to new research from cybersecurity firm Trend Micro that suggests organizations allocate more resources to people, processes and technology to be more prepared for cyberattacks and reduce their overall risk levels. The […]

Read More

Crestron DM NVX

Crestron Issues DM NVX Platform Firmware Update

April 18, 2022 TD Staff Leave a Comment

Crestron, the Rockleigh, N.J.-based workplace technology provider announced the latest enhancements to its DM NVX AV-over-IP platform. Since its introduction, the DM NVX has evolved with feature-rich firmware updates that consistently deliver a reliable and high-performing solution to customers. Crestron says it continues to adapt existing solutions with frequent upgrades and enhancements. These increase the solutions’ […]

Read More

Matrox Extio 3 IP KVM Extenders Tile View mage

Matrox Extio 3 IP KVM Tile View Adds Multi-System Control Options for Remote Workspaces

April 15, 2022 TD Staff Leave a Comment

Matrox Video, the Montreal, Canada-based video technology solutions provider expanded its display layout options and Full HD display support with its Extio 3 IP KVM extenders’ Tile View feature to provide users with new productivity-enhancing remote workspace configurations. Available via the latest Extio 3 software release, Tile View facilitates monitoring and controlling up to four […]

Read More

Atera ESET Integration

How Tarrask Malware Uses Scheduled Tasks for Defense Evasion

April 15, 2022 TD Staff Leave a Comment

The Microsoft Detection and Response Team (DART) in collaboration with the Microsoft Threat Intelligence Center (MSTIC) is warning of a defense evasion malware called Tarrask. The malware creates “hidden” scheduled tasks, and subsequent actions to remove task attributes, to conceal scheduled tasks from traditional means of identification. Microsoft notes the simplicity of the malware technique, […]

Read More

Human hand with magnifying glass found spam email with skull and cross bones computer virus on laptop computer. ZLoader attack

How to Identify and Defend Against ZLoader Attacks

April 14, 2022 TD Staff Leave a Comment

Microsoft 365 Defender Threat Intelligence Team has released details and a warning about the ZLoader Trojan. The ZLoader trojan, known for its ability to evolve and change from campaign-to-campaign, is said to be derived from the Zeus banking trojan first discovered in 2007. Microsoft says ZLoader is an attacker’s tool of choice— it has defense […]

Read More

Zero Trust, Leostream, AWS

iboss Launches Policy Manager For Zero Trust Implementation

April 13, 2022 Zachary Comeau Leave a Comment

Zero trust edge cloud security provider iboss has released its new Zero Trust Policy Manager designed to enable organizations of all sizes to implement zero trust policies in their IT environment. The Boston-based company’s Zero Trust Policy Manager (ZTPM) helps organizations implement zero trust in accordance with the new federal guidelines from the National Institute […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 50
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.