• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
Google, Bard

Google To Acquire Cybersecurity Leader Mandiant For $5.4 Billion

March 8, 2022 Zachary Comeau Leave a Comment

Google is acquiring Mandiant and is adding the cybersecurity defense and response firm’s services to its Google Cloud portfolio in a $5.4 billion deal. Mandiant, formerly part of cybersecurity firm FireEye and a reported target of Microsoft, will complement Google Cloud’s existing security offerings, including BeyondCorp Enterprise for Zero Trust and VirusTotal for malicious content […]

Read More

Google, AI, Google Security AI Workbench

Reports: Google, Not Microsoft, Probing Mandiant Acquisition

March 7, 2022 Zachary Comeau Leave a Comment

The fate of Mandiant, formerly part of cybersecurity firm FireEye and a reported target of Microsoft, could just as well end up as part of Google, according to new reports. According to The Information, citing sources familiar with the talks, Google is eyeing Mandiant in a bid to boost its cloud security offerings. The Information’s […]

Read More

Progress MOVEit vulnerability

The Conti Ransomware Leaks: Six Takeaways

March 7, 2022 Zachary Comeau Leave a Comment

Information security, nation-state hacking, ransomware and malware have been front and center of the Russia-Ukraine conflict, with hackers on each side allegedly launching large-scale attacks against the infrastructure of their opponent. Although Russia is infamous for its hacking activities and ransomware groups long believed to be protected by the country’s government, threat actors in other […]

Read More

NSA Network Security

NSA: This Is How Admins Should Do Network Security

March 7, 2022 Zachary Comeau Leave a Comment

With cybersecurity now the top concern for IT leaders and their team, dozens of organizations, including private companies, nonprofits, IT providers and cybersecurity vendors have released cyber-hardening guides over the last few years to help organizations secure their infrastructure. The U.S. Cybersecurity and Infrastructure Agency, in particular, has been a leading voice when it comes […]

Read More

Access Networks' addition of the Sophos XGS Series Firewall/Router will add performance and security improvements to its Core Systems.

Access Networks Unveils Sophos XGS Series Firewall/Router

March 7, 2022 TD Staff Leave a Comment

Access Networks says the new firewall/router brings a new level of performance and protection to its Core Systems to help protect homeowners from advanced cyber threats. Access Networks emphasizes that with the workplace now utilizing work from home (WFH) and hybrid work schedules home network security is more important than ever to protect sensitive work-related data. […]

Read More

CISA Software Security

CISA Adds 95 New Bugs To Database Of Known Exploited Vulnerabilities

March 4, 2022 Zachary Comeau Leave a Comment

There are 95 new known exploited vulnerabilities that IT and security professionals should immediately investigate and mitigate, including several that date back at least a decade, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The agency added the vulnerabilities to its catalog of known exploited vulnerabilities based on evidence of exploitation in the […]

Read More

1Password Browser Extension

We Aren’t Getting Much Better At Password Security

March 4, 2022 Zachary Comeau Leave a Comment

Users are not getting much better at password security, as 1.7 billion credential were exposed online in 2021, and 64% of users with multiple compromised passwords reuse similar passwords for multiple accounts, according to a new report from account security firm SpyCloud. The company, in its Identity Exposure Report, says the number of exposed credentials […]

Read More

Social Engineering

5 Strangest Social Engineering Tactics of 2021

March 3, 2022 TD Staff Leave a Comment

Cyber attackers can be quite inventive when it comes to social engineering and persuading someone to do something that isn’t always in their best interest— logging into a phishing site and entering their credentials, luring victims to pay a fake invoice, or simply opening a file containing malware. Cybersecurity firm Proofpoint rounded up the top […]

Read More

MIcrosoft Entra External ID

Microsoft Introduces Role-based Access Management Capabilities in Azure AD

March 3, 2022 Zachary Comeau Leave a Comment

Microsoft is introducing a series of new capabilities in Azure Active Directory, including custom roles for delegated app management to help enable fine-grained authorization and simplify management at scale in Azure and Microsoft 365. According to a Tech Community blog, custom roles for delegated app management is now in general availability, enabling custom roles for […]

Read More

Google Cybersecurity Certificate

Senate-Passed Cybersecurity Bill Requires Incident Reporting Within 72 Hours

March 2, 2022 Zachary Comeau Leave a Comment

The Senate has passed a bipartisan bill designed to harden U.S. cybersecurity in both public and private sectors requiring organizations to report significant cyberattacks and ransomware payments to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The proposed bill, Strengthening American Cybersecurity Act, combines language from three bills that Sens. Rob Portman (R-OH), Gary Peters […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 57
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.