• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
3CX Hack Supply Chain attack compromise

These Destructive Malware Strains Have Targeted Organizations in Ukraine

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Cyber Attack Trends Amid Russia-Ukraine Conflict

February 28, 2022 TD Staff Leave a Comment

Cyber attacks on Ukraine’s government and military sector surged by 196% within the first three days of Russia’s invasion on Feb. 24, 2022, compared to the start of the month, according to Check Point Research. The cybersecurity firm released its findings from the first few days of the conflict, finding that attacks against Ukraine far […]

Read More

Malware file types, HP Wolf security

Research Discover Highly Advanced Espionage Malware Linked To China-based Hackers

February 28, 2022 Zachary Comeau Leave a Comment

Symantec, a subsidiary of Broadcom and a member of the U.S. Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative, has uncovered a new malware strain the company calls the most advanced piece of malware ever linked to China-based threat actors. The Symantec Threat Hunter team says it uncovered malware that appears to be used […]

Read More

Hybrid Meeting; FBI warns of BEC scams

How to Use Virtual Meeting Platforms Securely

February 25, 2022 TD Staff Leave a Comment

Americans spend an average of two hours and five minutes a week making video calls via online meeting platforms like Zoom, Skype, and Microsoft Teams, according to research by NordVPN. With videoconferencing platforms gaining popularity, cybersecurity experts are warning users about the dangers of being scammed and potentially infected by malware through them. “Since the […]

Read More

Microsoft Security RSA Conference

Microsoft Extends Azure AD Identity Protection Into Workload Identities

February 24, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure AD Identity Protection for workload identities that includes purpose-built anomaly detection capabilities for workload identities with user detections to help protect the entire IT environment. According to Microsoft, cloud migrations include software workloads like apps, services or scripts that access cloud resources and have workload identities in […]

Read More

Microsoft Defender Google Cloud

Microsoft Defender for Cloud Can Now Protect Google Cloud Environments

February 23, 2022 Zachary Comeau Leave a Comment

Microsoft now offers multi-cloud protection for the cloud industry’s top three platforms by extending the native capabilities for Microsoft Defender for Cloud to the Google Cloud Platform. This follows cloud security support for AWS in Defender for Cloud, which Microsoft released last November during its Ignite conference. According to Microsoft, Defender for Cloud support for […]

Read More

China, Hacking, Microsoft, Routers, Volt Typhoon

Ransomware Attacks Rise Almost 93% in 2021

February 23, 2022 TD Staff Leave a Comment

Ransomware attacks almost doubled in 2021, rising to 92.7% year-over-year, according to NCC Group, a global cyber security and risk mitigation firm. The firm’s 2021 Annual Threat Monitor shows a gradual but noticeable rise in ransomware attacks since the pandemic began. Ransomware accounted for 65.38% of all incidents dealt with by NCC’s global cyber response […]

Read More

CISA Software Security

Supplement Your Cybersecurity Staff With These Free CISA Resources

February 22, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released a litany of free security tools and resources designed to help organizations advance its security capabilities, including widely used open-source tools and services offered by private and public sector organizations. The catalog of free resources comes amid rising geopolitical tensions that both government agencies and software […]

Read More

Phishing Success

Phishing, Ransomware Continue To Plague Businesses As Awareness Stagnates

February 22, 2022 Zachary Comeau Leave a Comment

More than two-thirds were infected with ransomware from a direct email payload, and 60% of those victims paid the ransom, according to new research from cybersecurity and compliance firm Proofpoint. The company’s 2022 State of the Phish Report, the results of a survey of 600 IT professionals and 3,500 workers, reveals that phishing and other […]

Read More

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Reports 400,000 Daily Log4j scans

February 22, 2022 Zachary Comeau Leave a Comment

Google says there are as many as 400,000 scans for Log4j vulnerabilities against Google Cloud each day, suggesting that IT professionals need to continue to be vigilant and ensure that they remediate vulnerable systems. The claim comes in Google’s Threat Horizons Executive Snapshot this month, a quarterly report from the company’s Cybersecurity Action Team. Google […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Page 62
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.