• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Microsoft Fortra healthcare ransomware

Ransomware Attacks Increase 105% In 2021, SonicWall Report Finds

February 17, 2022 Zachary Comeau Leave a Comment

Ransomware actors had a field day last year, conducting over 623 million ransomware attacks around the world, resulting in a 105% increase from the year prior, according to cybersecurity firm SonicWall. The company’s 2022 Cyber Threat Report released Thursday also finds that ransomware volume has exploded since before the pandemic, rising 232% since 2019. That […]

Read More

Cassandra Apache vulnerability

Patch This Apache Cassandra Vulnerability

February 17, 2022 TD Staff Leave a Comment

Researchers at JFrog Security have released details of a remote code execution vulnerability with the popular NoSQL database, Apache Cassandra. The popular database is used by enterprises such as Netflix, Twitter, Constast Contact, Cisco, Reddit and many more. The open source database is also used by devOps and cloud-native development circles and companies that provide […]

Read More

Russia Ukraine Cyberattacks

Cybersecurity Experts: Ukraine, Russia Crisis Could Result in U.S. Cyberattacks

February 16, 2022 Zachary Comeau Leave a Comment

As the world waits to see what unfolds in Ukraine, cybersecurity professionals are urging western governments and organizations to be prepared for serious cyberattacks coming from Russia and its allies. These warnings come from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) as well as private sector cybersecurity software providers like Mandiant that have raised […]

Read More

Azure AD Unmanaged Accounts

This Azure AD Authentication Method Can Help With Zero Trust

February 16, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure Active Directory certificate-based authentication across its commercial and U.S. government clouds, a response to President Joe Biden’s executive order on cybersecurity designed to push the government to zero trust. The offering is designed to help government customers meet phishing-resistant MFA using the PIV/CAC cards, and it can […]

Read More

CISA Warns of Increased Globalized Threat of Ransomware

February 16, 2022 Alyssa Borelli Leave a Comment

In 2021, 14 of the 16 U.S. critical infrastructure sectors were hit with ransomware, according to the CISA, FBI and NSA in a new report. And it’s not just happening the U.S., Australia’s critical infrastructure entities have been hit, as well as in the U.K. The education sector was one of the top U.K. sectors […]

Read More

VMware Vulnerabilities

VMware: Patch These Vulnerabilities Immediately

February 15, 2022 Zachary Comeau Leave a Comment

VMware is urging customers to immediately patch vulnerabilities in ESXi, Workstation, Fusion and Cloud Foundation running in on-premises or co-located settings. The patches fix a total of five CVEs in those products that were disclosed during the Tianfu Cup, a Chinese security event that VMware participates in. According to the company, the flaws were reported […]

Read More

Proofpoint CISO, CISOs cyberattack

Red Canary Adds 24/7 Remediation, Protection Features

February 15, 2022 Zachary Comeau Leave a Comment

Threat detection provider Red Canary has added new capabilities and active remediation features to its cybersecurity offerings, including protections for systems beyond the endpoint and a new active 24/7 threat response offering. According to the company, the new threat investigation and active remediation features are designed to help customers investigate, triage and respond to threats, […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Navigating the IT Considerations of M&A

February 14, 2022 Zachary Comeau Leave a Comment

In today’s digital age, when technology drives innovation and serves as a foundational piece of any organization, the IT department is a critical consideration when conducting a merger or an acquisition. Integrating the technology used by each organization is an incredibly important and time-consuming task that requires diligence and deliberate decision-making to ensure that the […]

Read More

Young man with vr headset

Security Vulnerabilities Found in VR Headsets

February 14, 2022 TD Staff Leave a Comment

Voice command features on virtual reality (VR) headsets pose vulnerabilities and could lead to major privacy eavesdropping attacks, according to researchers at Rutgers University-New Brunswick. The research shows hackers could use popular AR/VR headsets with built in motion sensors to record subtle, speech-associated facial dynamics to steal sensitive information communicated via voice-command, including credit card […]

Read More

CISA Software Security

This CISA Resource Can Help Protect You From Actively Exploited Bugs

February 14, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been extremely active in helping both the public sector and private sector respond to cybersecurity threats, and is often one of the leading voices when new threats emerge. The agency, part of DHS, has released guides, advisories and other resources on current and historical threats, and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 59
  • Page 60
  • Page 61
  • Page 62
  • Page 63
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.