• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Malware file types, HP Wolf security

Research Discover Highly Advanced Espionage Malware Linked To China-based Hackers

February 28, 2022 Zachary Comeau Leave a Comment

Symantec, a subsidiary of Broadcom and a member of the U.S. Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative, has uncovered a new malware strain the company calls the most advanced piece of malware ever linked to China-based threat actors. The Symantec Threat Hunter team says it uncovered malware that appears to be used […]

Read More

Hybrid Meeting; FBI warns of BEC scams

How to Use Virtual Meeting Platforms Securely

February 25, 2022 TD Staff Leave a Comment

Americans spend an average of two hours and five minutes a week making video calls via online meeting platforms like Zoom, Skype, and Microsoft Teams, according to research by NordVPN. With videoconferencing platforms gaining popularity, cybersecurity experts are warning users about the dangers of being scammed and potentially infected by malware through them. “Since the […]

Read More

Microsoft Security RSA Conference

Microsoft Extends Azure AD Identity Protection Into Workload Identities

February 24, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure AD Identity Protection for workload identities that includes purpose-built anomaly detection capabilities for workload identities with user detections to help protect the entire IT environment. According to Microsoft, cloud migrations include software workloads like apps, services or scripts that access cloud resources and have workload identities in […]

Read More

Microsoft Defender Google Cloud

Microsoft Defender for Cloud Can Now Protect Google Cloud Environments

February 23, 2022 Zachary Comeau Leave a Comment

Microsoft now offers multi-cloud protection for the cloud industry’s top three platforms by extending the native capabilities for Microsoft Defender for Cloud to the Google Cloud Platform. This follows cloud security support for AWS in Defender for Cloud, which Microsoft released last November during its Ignite conference. According to Microsoft, Defender for Cloud support for […]

Read More

China, Hacking, Microsoft, Routers, Volt Typhoon

Ransomware Attacks Rise Almost 93% in 2021

February 23, 2022 TD Staff Leave a Comment

Ransomware attacks almost doubled in 2021, rising to 92.7% year-over-year, according to NCC Group, a global cyber security and risk mitigation firm. The firm’s 2021 Annual Threat Monitor shows a gradual but noticeable rise in ransomware attacks since the pandemic began. Ransomware accounted for 65.38% of all incidents dealt with by NCC’s global cyber response […]

Read More

CISA Software Security

Supplement Your Cybersecurity Staff With These Free CISA Resources

February 22, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released a litany of free security tools and resources designed to help organizations advance its security capabilities, including widely used open-source tools and services offered by private and public sector organizations. The catalog of free resources comes amid rising geopolitical tensions that both government agencies and software […]

Read More

Phishing Success

Phishing, Ransomware Continue To Plague Businesses As Awareness Stagnates

February 22, 2022 Zachary Comeau Leave a Comment

More than two-thirds were infected with ransomware from a direct email payload, and 60% of those victims paid the ransom, according to new research from cybersecurity and compliance firm Proofpoint. The company’s 2022 State of the Phish Report, the results of a survey of 600 IT professionals and 3,500 workers, reveals that phishing and other […]

Read More

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Reports 400,000 Daily Log4j scans

February 22, 2022 Zachary Comeau Leave a Comment

Google says there are as many as 400,000 scans for Log4j vulnerabilities against Google Cloud each day, suggesting that IT professionals need to continue to be vigilant and ensure that they remediate vulnerable systems. The claim comes in Google’s Threat Horizons Executive Snapshot this month, a quarterly report from the company’s Cybersecurity Action Team. Google […]

Read More

MIcrosoft Entra External ID

Microsoft Pushes Zero Trust Capabilities In Azure

February 18, 2022 Zachary Comeau Leave a Comment

Microsoft is positioning itself as a partner in the U.S. government’s push toward a Zero Trust architecture, including the publication of resources designed to help organizations migrate to the cloud and adopt a Zero Trust framework and the release of Azure capabilities to help secure cloud environments. In a new blog, Microsoft outlined several resources, […]

Read More

Atera ESET Integration

Hackers Are Sending Malicious Files In Microsoft Teams

February 17, 2022 Zachary Comeau Leave a Comment

As Microsoft Teams boasts a growing user base that is now over 270 million monthly active users, hackers are targeting it as a launchpad for sending malicious files, according to a new report from cybersecurity firm Avanan. The company, a Check Point subsidiary, says it began last month observing hackers dropping malicious executable files in […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Page 62
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.