• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Atera integrations

Gartner: Software, Services To Push Global IT Spending to $4.4 Trillion in 2022

April 6, 2022 Zachary Comeau Leave a Comment

Despite inflation, geopolitical disruptions and talent shortages, global IT spending is expected to rise by 4% and hit $4.4 trillion this year, according to Gartner. Despite “one of the noisiest years on record” for CIOs, who are dealing with geopolitical disruptions, inflation, currency fluctuations and supply chain challenges, IT decision-makers are accelerating their IT investments […]

Read More

Creston VC-4 enterprise IT room control

Crestron Enhances VC-4 For Enterprise IT Management Of Meeting Rooms

April 6, 2022 Zachary Comeau Leave a Comment

Crestron has announced the expansion of its room control portfolio with key enhancements to its software-based control solution VC-4 Virtual Control that make the solution more scalable yet still powerful. According to the Rockleigh, N.J.-based provider of networking solutions, the new VC-4 software platform enables IT managers to scale room configurations faster than traditional hardware […]

Read More

Zoom Zero-Day

How to Become a Bug Bounty Hunter for Zoom

April 6, 2022 Alyssa Borelli Leave a Comment

If you’re a college student, professor, a teen just learning to hack into everyday things , or a Zoom user who just “noticed something weird,” there’s an opportunity to join an ethical hacker community. Videoconferencing giant Zoom has invested in a global team of security researchers via a private bug bounty program on HackerOne’s platform. […]

Read More

Windows 11, Windows 365 Boot, IT management, privacy, security,

Security, IT Management Highlight New Windows 11 Features

April 5, 2022 Zachary Comeau Leave a Comment

Microsoft has unveiled what it has in store for Windows 11 and Windows 365 for commercial customers and IT managers, including new features in security, management, productivity and collaboration. The announcements came during the company’s  Windows Powers the Future of Hybrid Work event, one quarter through the first full year of Windows 11, and are largely […]

Read More

Cloud Mistakes, Gartner

IDC: Cloud Infrastructure Spending Shows Strong Growth

April 5, 2022 TD Staff Leave a Comment

Spending on compute and storage infrastructure products for cloud infrastructure, including dedicated and shared environments, increased 13.5% year-over-year in the fourth quarter of 2021 (4Q21) to $21.1 billion according to the Needham, Mass-based International Data Corporation (IDC). As supply chain constraints have depleted vendor inventories over the past several quarters, IDC reports year-over-year growth in […]

Read More

Tenable Splunk

What We Know So Far About Spring4Shell

April 5, 2022 Zachary Comeau Leave a Comment

The information technology and cybersecurity communities are still assessing the impact of Spring4Shell, a remote code execution vulnerability recently disclosed in the Spring Framework for Java that could allow for remote code execution in vulnerable installations. While exploit attempts have not yet been widespread, there is a simmering concern that this bug could be nearly […]

Read More

Network of devices and mobile apps MDM

Managing Mobile Devices in the Hybrid Workplace in 2022

April 5, 2022 Amy Carr Leave a Comment

Managing devices in the workplace has certainly evolved over the years for IT professionals. Until the COVID-19 pandemic hit, work environments were fairly simple — most people got up every day and headed to an office to work. But since 2020, things have changed significantly. Without a doubt, the hybrid work model is popular among […]

Read More

government cyberattacks Google Microsoft

Google: Government Employees Echo Concerns About Cyberattacks on Legacy Systems

April 5, 2022 TD Staff Leave a Comment

Government workers are echoing concerns about cyberattacks and the government’s reliance on Microsoft and legacy productivity software, according to a new survey conducted by Public Opinion Strategies commissioned by Google Cloud. The survey polled 2,600 Americans workers, including 600 workers from the Washington, D.C. metro area, and 338 workers employed by federal, state or local […]

Read More

Microsoft Security RSA Conference

Check Out These New Role-Based Access Control Features in Azure AD

April 4, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing new role-based access control features in Azure Active Directory designed to enable IT to create custom roles for devices and add devices as administrative units for more fine-grained delegation of device administration. Administrators can create custom roles using device permissions to delegate access. Admins can do this by navigating to Roles and […]

Read More

FCC: Avoid Kaspersky Software

April 1, 2022 TD Staff Leave a Comment

The Federal Communications Commission (FCC) has added Moscow-based Kaspersky Lab, maker of a popular antivirus software, to its list of communications equipment and service providers deemed threats to U.S. national security. Kaspersky is the first Russian company to be added to the FCC listing, which is currently dominated by China-based firms, including video surveillance giants Hikvision and Dahua. With […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.