• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Log4j, Older Vulnerabilities, CISA KEV

Malware Developers Are Targeting These 10 2021 Security Bugs

April 13, 2022 Zachary Comeau Leave a Comment

Security analysts at Skybox Security uncovered a 42% increase in new ransomware programs targeting known vulnerabilities last year, including critical vulnerabilities discovered in Log4j and Exchange Server. The San Jose, Calif. cybersecurity company’s 2022 Vulnerability and Trends Report, released this week, details how quickly hackers capitalize on new security bugs and continue to reduce the […]

Read More

McAfee ransomware attack

Organizations are Under-Prepared to Effectively Mitigate Against the Risks and Impact of Ransomware Attacks

April 13, 2022 TD Staff Leave a Comment

Gaps in readiness are impacting the ability of many organizations to manage and recover from ransomware attacks, according to research by Zerto, a Boston-based cloud data management and protection platform. This gap poses a risk to mitigation strategies presented by widespread skills shortages and over-reliance on internal resources. One of the best protections against a […]

Read More

Fortinet Vulnerability, Fortigate

April 2022 Patch Tuesday: 10 Critical Microsoft Bugs, RCEs and More

April 12, 2022 Zachary Comeau Leave a Comment

IT admins have a lot of patching to do this month as Microsoft has released patches to address nearly 130 security vulnerabilities, including 10 critical bugs and three with a CVSS of 9.8. According to Zero Day Initiative (ZDI), the vulnerability disclosure initiative of cybersecurity firm Trend Micro, this volume of patches has not been […]

Read More

Why Healthcare Needs Better Data Security

April 12, 2022 Brian Foy Leave a Comment

As the healthcare industry accelerates into an increasingly digitized world, cyber breaches exposing confidential patient data are becoming more commonplace. In fact, according to the Department of Health and Human Services’ Office for Civil Rights’ breach portal, a staggering 44,993,618 healthcare records were exposed or stolen in 2021. The implications of these security breaches are […]

Read More

Microsoft Security RSA Conference

Microsoft’s New Defender for Endpoint for Windows Sever 2012 R2, 2016 Now Available

April 12, 2022 Zachary Comeau Leave a Comment

Microsoft’s new unified Defender for Endpoint solution for Windows Server 2012 R2 and Windows Server 2016 is now generally available. According to Microsoft, this adds new prevention, detection and response capabilities to Defender for Endpoint on those versions that were previously only available on Windows Server 2019 and later. The new unified Defender reduces complexity […]

Read More

kaseya datto

Kaseya to Acquire MSP-focused Security, Recovery Provider Datto for $6.2 Billion

April 11, 2022 Zachary Comeau Leave a Comment

Norwalk, Conn-based IT management and security software provider Kaseya is acquiring Datto, a Miami, Fla.-based security and disaster recovery software provider for managed service providers, for $6.2 billion. According to a press release, the all-cash transaction will be funded by an equity group led by Insight Partners and including TPG, Temasek and Sixth Street. Datto […]

Read More

Malware file types, HP Wolf security

Spring4Shell Being Exploited To Spread Mirai Botnet

April 11, 2022 Zachary Comeau Leave a Comment

Security researchers with cybersecurity firms say hackers are actively exploiting the Spring4Shell vulnerability to deploy the Mirai botnet malware. In a research report detailing the exploits, Tokyo-based cybersecurity firm Trend Micro says it has observed the exploitation since the start of this month after the remote code execution bug (CVE-2022-22965) in the Spring Framework was […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Two Cybersecurity Leaders Partner To Help You Investigate Sophisticated Hacks

April 8, 2022 Zachary Comeau Leave a Comment

Mandiant and CrowdStrike, two of the largest cybersecurity providers, are teaming up to help joint customers investigate, remediate and defend against advanced cybersecurity threats, with Mandiant using the CrowdStrike Falcon platform and subscription offerings for its incident response services. The partnership between the two cybersecurity giants will enable organizations of all sizes to leverage both […]

Read More

China, Hacking, Microsoft, Routers, Volt Typhoon

Report: Advanced Threats Detected Rise 33% in Q4

April 7, 2022 Zachary Comeau Leave a Comment

If the fourth quarter for 2021 is any indication, 2022 will be another year that cybersecurity and IT professionals would want to forget, as advanced network attacks increase by 33% in the fourth quarter, indicating a higher level of zero day threats than ever before, reports WatchGuard Technologies. In a new analysis of the fourth […]

Read More

FBI Russian Botnet

FBI Takes Down Russian GRU Sandworm Botnet: What You Need To Know

April 7, 2022 Zachary Comeau Leave a Comment

The FBI and a contingent of U.S. agencies and cybersecurity professionals have removed malware from vulnerable internet-connected firewall devices to remove the Russian-implanted botnet Sandworm and disable the command and control infrastructure on thousands of underlying victim devices. Via a court order, the FBI “copied and removed malware from vulnerable internet-connected firewall devices that Sandworm […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.