• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
MIcrosoft Entra External ID

Microsoft Releases New Defender for Identity Response Capabilities

April 1, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the general availability of new response actions in Microsoft Defender for Identity for on-premises Active Directory accounts when an identity is compromised and simultaneously protect identities across cloud and on-premise environments. According to Microsoft, the core components of an identity security product should work to prevent malicious actions, detect them, investigate and […]

Read More

Microsoft 365 domain, cloud.microsoft

Microsoft Office 365 Government Secret Cloud Coming Soon

April 1, 2022 Alyssa Borelli Leave a Comment

Microsoft announced a new U.S. government cloud environment: Office 365 Government Secret Cloud which is currently under review, pending accreditation with targeted availability starting mid-2022. The new Azure environment is built to support the U.S. Federal Civilian, Department of Defense, intelligence community and U.S. government partners working within the secret enclave. As workloads have shifted […]

Read More

Windows Update Email Alerts

Microsoft Recommends These Windows Update Policies For Your Organization’s Devices

March 31, 2022 Zachary Comeau Leave a Comment

Managing Windows Update in Microsoft can be complicated — especially when admins implement more policies than necessary and don’t leverage the default settings while managing a variety of Windows devices. To help admins better manage the update cycle in their organizations, Microsoft has released a Tech Community blog that details how to best manage Windows […]

Read More

Vulnerability Scanning

The Key Components of a Vulnerability Scanning & Management Program

March 31, 2022 Zachary Comeau Leave a Comment

With thousands of new software vulnerabilities to protect against each year, it is critical that organizations develop a robust vulnerability management program that can quickly identify and remediate vulnerabilities in IT environments. Issues like Log4Shell, PrintNightmare, ProxyLogon and dozens of other critical vulnerabilities in widely used systems have kept IT departments up at night as […]

Read More

zoom chat leader, Enterprise Sound Bar Collaboration Kit, videoconferencing, cybersecurity

Must-Have Cybersecurity Features for Videoconferencing

March 30, 2022 TD Staff Leave a Comment

George Waller, EVP and co-founder of StrikeForce Technologies, an entrepreneur and technologist with over two decades in the cybersecurity and computer industries offers insights into must have cybersecurity features for videoconferencing and how we should be thinking about meetings in the future. Q: What are the top cybersecurity and data privacy concerns with general purpose […]

Read More

Metaverse Cybersecurity

Interested in the Metaverse? Prioritize Cybersecurity, Microsoft Says.

March 30, 2022 Zachary Comeau Leave a Comment

As Big Tech firms begin to dive head first into the metaverse, Microsoft is urging the industry to make cybersecurity a priority and establish core security principles before the emerging technology becomes too advanced and vulnerable to exploitation. In a blog post, Charlie Bell, the company’s executive vice president of security, compliance, identity and management, […]

Read More

Log4Shell, Log4j, CVE-2021-44228

VMware Horizon Servers Still Under Log4Shell Attacks

March 29, 2022 Zachary Comeau Leave a Comment

Hackers are continuing to leverage the Log4Shell vulnerability to attack VMware Horizon servers and deploy cryptocurrency mining malware and backdoors, with a large wave of such attacks from mid-January still ongoing, according to cybersecurity firm Sophos. In a new report, Sophos says the attempts to leverage Horizon continued and grew in number throughout January and […]

Read More

Crestron DM NVX

Crestron’s DM NVX AV-over-IP Line Receives IT Security Certifications

March 29, 2022 Zachary Comeau Leave a Comment

Workplace technology maker Crestron says its line of DM NVX AV-over-IP solutions are now certified by the National Information Assurance Partnership (NIAP) and the U.S. government’s Common Criteria, certifying that the products meet cybersecurity standards. The designations open up new avenues for the DM NVX products in U.S. government agencies, including federal civilian agencies and […]

Read More

Google, Bard

Update Google Chrome, Microsoft Edge To Patch Vulnerability Now

March 28, 2022 Zachary Comeau Leave a Comment

Google and Microsoft are urging organizations to deploy a patch to address a newly discovered zero-day vulnerability in Chrome. Other than being called a “Type Confusion in V8” and that an exploit for it exists in the wild, details about this particular vulnerability are scarce. Google says the Chrome update 99.0.4844.84 for Windows, Mac and […]

Read More

CISA Software Security

CISA Adds 66 CVEs to Known Exploited Vulnerabilities List

March 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added 66 software security bugs that are being actively exploited to its database of known exploited vulnerabilities, including some from leading technology vendors that date back several years. For the majority of the products implicated in the new additions, there are patches available to remediate the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Page 57
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.