• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Education AI UCC Microphones Mass Notification Generative AI
Google, Passkeys

Finding a Domain Just Got Easier with Google Domains

March 18, 2022 Alyssa Borelli Leave a Comment

Whether one’s working on a side hustle, promoting a passion project or starting a new business, they can now build an online presence with Google domains, now out of beta. Google launched Google Domains, in beta, in 2015, to be the “easiest place to find, buy and manage a domain.” Since the beta version, “millions […]

Read More

Our Key Takeaways From Microsoft’s 2022 Work Trends Index

March 18, 2022 Zachary Comeau Leave a Comment

Microsoft has released its second annual Work Trend Index Report, titled “Great Expectations: Making Hybrid Work Work,” and it contains some interesting findings about the state of hybrid work since the onset of the COVID-19 pandemic and remote work two years ago. The report dishes on how workers view the office, explores a disconnect between […]

Read More

Professional ChromeOS Administrator certification

What’s Up With All The Zero Days in Google Chrome?

March 17, 2022 Zachary Comeau Leave a Comment

Google has addressed the reasons for all of the Zero Days discovered in Chrome recently, citing more vendor transparency, evolved attacker focus, the increased use of vulnerabilities in attacks and the increasing complexity of software. According Project Zero, Google’s vulnerability reporting entity, there have been 25 zero day vulnerabilities in Google Chrome since 2014, including […]

Read More

Extron VCA 100 with a screenshot of the VCP settings.

Extron’s VCA 100 Offers AV Control For Up to 50 Rooms

March 17, 2022 TD Staff Leave a Comment

Anaheim, Calif-based Extron has introduced the VCA 100 Virtual Control Appliance with integrated virtual control processors (VCPs). This new virtual control system helps organizations deploy, scale and manage their AV systems. It does so by providing the flexibility of hosting AV control resources in a central location, right alongside the already managed resources of the […]

Read More

Proofpoint CISO, CISOs cyberattack

CISA: Russian Hackers Leveraged Default MFA, PrintNightmare To Gain Network Access

March 16, 2022 Zachary Comeau Leave a Comment

According to U.S. authorities, Russian state-sponsored hackers are leveraging default multi-factor authentication (MFA) protocols and the PrintNightmare vulnerabilities to gain network access. In a joint advisory, the FBI and Cybersecurity and Infrastructure Security Agency say cyber actors backed by the Russian government began pairing those attack vectors as early as May 2021 to target a […]

Read More

SBOMs

What Needs To Be In An SBOM?

March 15, 2022 Zachary Comeau Leave a Comment

When alleged Russian hackers compromised the SolarWinds Orion platform to spy on U.S. agencies and other high-profile entities, the tech industry renewed its call for the adoption of software bills of materials (SBOM) — an inventory of components that make up the final product. Advocates say that will help give IT and cybersecurity professionals the […]

Read More

Cybersecurity Workforce

Why Women Are Needed To Fill The Cybersecurity Workforce

March 14, 2022 Alyssa Borelli Leave a Comment

In 2021, women represented about 25% of the global cybersecurity workforce, according to Cybersecurity Ventures. With over 2.5 million-plus cybersecurity job openings, women can help fill them, writes Vasu Jakkal, vice president of security, compliance, identity, and management at Microsoft in a blog post. With millions of job openings for cybersecurity, it’s putting a strain […]

Read More

IoT Security

New Microsoft Defender for IoT Capabilities Helps Create Secure-By-Design Devices

March 14, 2022 Zachary Comeau Leave a Comment

Microsoft has released the public preview for a new capability in Microsoft Defender for IoT that gives device builders and solution operators the ability to create secure-by-design, managed IoT devices. This capability comes after Microsoft recently announced Defender for IoT sensor, version 22.1, that features Azure portal to scale large environments and control the security […]

Read More

Stock photo of services available on a wireless network.

Black Box and Inseego Partner on Future-Proof 5G Solutions

March 14, 2022 TD Staff Leave a Comment

Black Box, the Lawrence, Penn.-based global solutions integrator, announced its strategic partnership with device-to-cloud industry innovator, Inseego. Together, the companies will provide a complete, advanced 5G and OnGo private LTE wireless network. The partnership thus allows Black Box to drive innovation in connectivity. This will then increase advanced wireless networking options to every market. Black […]

Read More

Atera ESET Integration

The Qakbot Malware Now Interjects Itself Into The Middle of Email Conversations

March 11, 2022 Zachary Comeau Leave a Comment

The notorious and heavily distributed email-borne malware Qakbot is now being spread via a new technique: inserting malicious replies into the middle of existing email conversations. According to cybersecurity firm Sophos, Qakbot uses the compromised accounts of other infected victims to interject itself in the form of a reply-all message that includes a short sentence […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 55
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.