• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Education AI UCC Microphones Mass Notification Generative AI
Cybersecurity testing, penetration testing, cyber threats

TD SYNNEX Launches Cybersecurity Training Program

January 24, 2022 Zachary Comeau Leave a Comment

Tech distribution giant TD SYNNEX has announced a new cybersecurity program designed to close the skills gap and upskill new and existing cybersecurity professionals for the firm’s channel partners. According to the company, the Passaged Program aims to reduce the cybersecurity skills gap through its Placement and Upskill initiatives that are designed to place candidates […]

Read More

Microsoft warns of macros-based malware

Microsoft Now Disables Excel Macros By Default

January 24, 2022 Zachary Comeau Leave a Comment

Excel is now a little safer for organizations to use as Microsoft is making a once optional setting that disables the usage of Excel 4.0 macros the default. According to a Tech Community blog, the setting—which was rolled out as an optional setting in July 2021—is now the default when users open Excel 4.0 macros. […]

Read More

cloud enterprise software benefits, benefits of cloud-based enterprise system

Stacklet Survey Reveals 3 Inhibitors for Accelerated Cloud Adoption

January 21, 2022 TD Staff Leave a Comment

Cloud governance, compliance and security policies are top inhibitors for organizations looking to adopt the cloud this year, according to a study by Arlington, VA-based developer Stacklet. The survey included over 700 IT professionals, developers and solutions architects from a cross-section of mid-to large-size companies in industries such as software, financial services, government and computers. […]

Read More

Malware Symantec Daxin

Report: 2021 Malware, Ransomware Levels Already Surpassed 2020 Levels By End Of Q3

January 20, 2022 Zachary Comeau Leave a Comment

While new research shows a decrease in total perimeter malware detection volume in the third quarter from the record highs in the second quarter, there was still more malware activity through the first three quarters than all of 2020. The report from endpoint protection provider WatchGuard Technologies also found that nearly half of zero-day malware […]

Read More

Linux Foundation Open Source Program, software development

Linux Foundation Now Offering Open Source Software Development Certification

January 19, 2022 TD Staff Leave a Comment

The Linux Foundation, the nonprofit organization enabling innovation through open source, has announced the availability of three new training courses on its edX platform: Open Source Software Development: Linux for Developers (LFD107x), Linux Tools for Software Development (LFD108x), and Git for Distributed Software Development (LFD109x). The three courses can be taken individually or combined to […]

Read More

Active Directory Misconfigurations

Why Active Directory Attack Paths are the Secret to Many Successful Ransomware Attacks

January 19, 2022 Andy Robbins Leave a Comment

It’s no secret that most major enterprises across the globe use Microsoft Active Directory (AD) for identity and access management. This ubiquity is also one of the predominant reasons AD is such a popular and attractive target for adversaries. What remains a mystery to many enterprises, however, is how adversaries – including the malicious actors […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

This is What A Russian Cyberattack Looks Like

January 18, 2022 Zachary Comeau Leave a Comment

Many organizations that have valuable data or even come close to touching sectors of the U.S. government are likely fending off cyberattacks from nation-state countries, with Russia among the top such threats. Now, due to increasing tensions between Russia, Ukraine and western countries, IT and cybersecurity professionals should be on the lookout for sophisticated threat […]

Read More

Cisco Talos Cloud RATs

Hackers Using Public Cloud Infrastructure, RATs to Deploy Malware

January 14, 2022 Zachary Comeau Leave a Comment

A new report from Cisco Talos, the IT vendor’s security research team, details how hackers are increasingly using public cloud services like Azure and AWS that eliminates the need to host their own infrastructure. Specifically, researchers narrowed in on a fall 2021 campaign that utilized variants of known remote access trojans that were deployed and […]

Read More

REvil Ransomware arrest

Notorious Ransomware Gang REvil Reportedly Taken Down By Russian Authorities

January 14, 2022 Zachary Comeau Leave a Comment

Russia says it has shut down the REvil ransomware gang, arrested several individuals and seized a total of about $7 million from the well-organized cybercrime operation that has plagued businesses in the U.S. and abroad for years. In a press release, the FSB, Russia’s principal security agency, says it carried out the operation at the […]

Read More

White House AI Regulations, ChatGPT, Generative AI

What Tech Firms Are Saying About The White House’s Open-Source Security Summit

January 13, 2022 Zachary Comeau Leave a Comment

After the Log4j vulnerabilities threw a wrench into the holiday plans of IT and cybersecurity folks last month, the federal government has taken swift action to address the issue, including instructing federal agencies to quickly patch and mitigate the vulnerability and making other resources available to the larger IT community. Now, the issue has been […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • Page 67
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.