• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Progress MOVEit vulnerability

The Conti Ransomware Leaks: Six Takeaways

March 7, 2022 Zachary Comeau Leave a Comment

Information security, nation-state hacking, ransomware and malware have been front and center of the Russia-Ukraine conflict, with hackers on each side allegedly launching large-scale attacks against the infrastructure of their opponent. Although Russia is infamous for its hacking activities and ransomware groups long believed to be protected by the country’s government, threat actors in other […]

Read More

NSA Network Security

NSA: This Is How Admins Should Do Network Security

March 7, 2022 Zachary Comeau Leave a Comment

With cybersecurity now the top concern for IT leaders and their team, dozens of organizations, including private companies, nonprofits, IT providers and cybersecurity vendors have released cyber-hardening guides over the last few years to help organizations secure their infrastructure. The U.S. Cybersecurity and Infrastructure Agency, in particular, has been a leading voice when it comes […]

Read More

Access Networks' addition of the Sophos XGS Series Firewall/Router will add performance and security improvements to its Core Systems.

Access Networks Unveils Sophos XGS Series Firewall/Router

March 7, 2022 TD Staff Leave a Comment

Access Networks says the new firewall/router brings a new level of performance and protection to its Core Systems to help protect homeowners from advanced cyber threats. Access Networks emphasizes that with the workplace now utilizing work from home (WFH) and hybrid work schedules home network security is more important than ever to protect sensitive work-related data. […]

Read More

CISA Software Security

CISA Adds 95 New Bugs To Database Of Known Exploited Vulnerabilities

March 4, 2022 Zachary Comeau Leave a Comment

There are 95 new known exploited vulnerabilities that IT and security professionals should immediately investigate and mitigate, including several that date back at least a decade, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The agency added the vulnerabilities to its catalog of known exploited vulnerabilities based on evidence of exploitation in the […]

Read More

1Password Browser Extension

We Aren’t Getting Much Better At Password Security

March 4, 2022 Zachary Comeau Leave a Comment

Users are not getting much better at password security, as 1.7 billion credential were exposed online in 2021, and 64% of users with multiple compromised passwords reuse similar passwords for multiple accounts, according to a new report from account security firm SpyCloud. The company, in its Identity Exposure Report, says the number of exposed credentials […]

Read More

Social Engineering

5 Strangest Social Engineering Tactics of 2021

March 3, 2022 TD Staff Leave a Comment

Cyber attackers can be quite inventive when it comes to social engineering and persuading someone to do something that isn’t always in their best interest— logging into a phishing site and entering their credentials, luring victims to pay a fake invoice, or simply opening a file containing malware. Cybersecurity firm Proofpoint rounded up the top […]

Read More

MIcrosoft Entra External ID

Microsoft Introduces Role-based Access Management Capabilities in Azure AD

March 3, 2022 Zachary Comeau Leave a Comment

Microsoft is introducing a series of new capabilities in Azure Active Directory, including custom roles for delegated app management to help enable fine-grained authorization and simplify management at scale in Azure and Microsoft 365. According to a Tech Community blog, custom roles for delegated app management is now in general availability, enabling custom roles for […]

Read More

Google Cybersecurity Certificate

Senate-Passed Cybersecurity Bill Requires Incident Reporting Within 72 Hours

March 2, 2022 Zachary Comeau Leave a Comment

The Senate has passed a bipartisan bill designed to harden U.S. cybersecurity in both public and private sectors requiring organizations to report significant cyberattacks and ransomware payments to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The proposed bill, Strengthening American Cybersecurity Act, combines language from three bills that Sens. Rob Portman (R-OH), Gary Peters […]

Read More

3CX Hack Supply Chain attack compromise

These Destructive Malware Strains Have Targeted Organizations in Ukraine

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Cyber Attack Trends Amid Russia-Ukraine Conflict

February 28, 2022 TD Staff Leave a Comment

Cyber attacks on Ukraine’s government and military sector surged by 196% within the first three days of Russia’s invasion on Feb. 24, 2022, compared to the start of the month, according to Check Point Research. The cybersecurity firm released its findings from the first few days of the conflict, finding that attacks against Ukraine far […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 57
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.