• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
3CX Supply Chain Attack

Microsoft Temporarily Disables Exploited MSIX Protocol Handler

February 7, 2022 Zachary Comeau Leave a Comment

Microsoft says that it has disabled the MSIX ms-appinstaller protocol and is working on a fix after a security bug was discovered that allows an attacker to spoof App Installer. According to a Microsoft Tech Community blog, an attacker could spoof App Installer to install a package that a user did not intend to install. […]

Read More

Microsoft Security RSA Conference

Microsoft: MFA Adoption At 22%

February 7, 2022 Zachary Comeau Leave a Comment

Despite a cyberthreat landscape that continues to evolve and become even more dangerous, just 22% of Microsoft Azure Active Directory customers have implemented strong identify authentication protection, Microsoft says in a new report. In the company’s Cyber Signals report, a new quarterly cyber threat intelligence brief marketed to IT and security leaders, Microsoft says less […]

Read More

Beyond Identity

Phishing Attacks That Bypass MFA Could Become The Norm

February 4, 2022 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) is now a standard cybersecurity practice—or at least it should be—across an organization’s IT environment. MFA has been proven to stop hackers from accessing accounts and thwart ransomware attacks from happening with compromised credentials alone. However, like with most IT security safeguards, cybercriminals are finding ways around it with phishing attacks that […]

Read More

SBOMs, Microsoft, Salus

SBOMs Will Become A Necessity In IT Ecosystem

February 4, 2022 Zachary Comeau Leave a Comment

IT professionals and software developers should prepare for Software Bills of Materials (SBOMs) to become a regular part of the IT ecosystem, according to new research from the Linux Foundation. The term, while already known to IT professionals, became more popular in the wake of several software supply chain security crises, including the SolarWinds compromise, […]

Read More

Microsoft Defender Endpoint Mobile

Microsoft Defender For Endpoint Can Now Manage Bugs in Android, iOS Devices

February 3, 2022 Zachary Comeau Leave a Comment

Microsoft is rolling out the general availability of a feature that allows administrators to manage the security and vulnerability management of Android and iOS devices with Microsoft Defender for Endpoint. The new cross-platform coverage, threat and vulnerability management capabilities now support all major device platforms across the organization, spanning workstations, servers and now mobile devices, […]

Read More

MIcrosoft Okta Lapsus$

Patch Now: RCE Vulnerability Found in Samba

February 2, 2022 Zachary Comeau Leave a Comment

Researchers have discovered an Out-of-Bounds Heap Read/Write vulnerability in Samba that could allow unauthenticated remote attackers to execute arbitrary code on affected installations of the free software. The bug, tracked as CVE-2021-44142, was initially discovered at the Pwn2Own event in Austin, and researchers with Trend Micro’s Zero Day Initiative discovered additional variants of the bug […]

Read More

LogMeIn GoTo

LogMeIn Rebrands As GoTo, Launches Unified App For IT Support, Collaboration

February 2, 2022 Zachary Comeau Leave a Comment

LogMeIn has rebranded as GoTo and launched a new IT management and support platform GoTo Resolve, and is rolling out a new experience for the company’s unified communications-as-a-service product GoTo Connect. Those products will be united by a single application, administrative system and converging user experience that combines support and communication products. These changes are […]

Read More

Microsoft Security RSA Conference

Microsoft Adds New Settings To Configure Local User Group Membership in Endpoint Security

February 1, 2022 Zachary Comeau Leave a Comment

IT admins can now configure local group membership settings for Windows devices, enabling admins to granularly manage the membership of built-in groups on the Windows platform to ensure users have the correct privileges. In a Tech Community blog, the Intune Support Team said this new feature comes with a built-in template in the Endpoint security […]

Read More

Expel MDR for Kubernetes, cloud

Cloud Migration Is a Priority, But Security Concerns Remain

February 1, 2022 Zachary Comeau Leave a Comment

Although fewer than 40% of tech executives store more than half of their legacy app data on the cloud, more than 80% of tech leaders are prioritizing a move to the cloud for their legacy app data over the next 12 months, according to new research from cloud migration software provider Archive360. The company’s survey […]

Read More

Windows Update Connectivity

Microsoft: This is Why Some Windows Devices Don’t Update

January 31, 2022 Zachary Comeau Leave a Comment

Microsoft says devices need to be powered on and connected to Windows Update for at least eight hours to ensure a successful update. In a Tech Community blog on achieving better patch compliance, the company says it looked into why some Windows devices are not always full up to date, and one of the most […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 61
  • Page 62
  • Page 63
  • Page 64
  • Page 65
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.