• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
Insider Risk, Microsoft

Both Negligent and Malicious Insider Cyber Threats Are Increasing

January 25, 2022 Zachary Comeau Leave a Comment

For the last two years as organizations adapt with remote work and other effects of the COVID-19 pandemic, cybercriminals have had a field day by exploiting weaknesses in distributed work security and the fact that our attention is elsewhere. That has forced many companies to invest in new technology to harden network defenses from outside […]

Read More

Phishing Success

The Most Imitated Brands in Phishing Attempts

January 25, 2022 TD Staff Leave a Comment

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal credentials or deploy malware via sophisticated phishing techniques. Twenty-three percent of all brand phishing attempts were related to DHL, up from just 9% in the previous quarter, according to Check Point Research’s latest Q4 brand phishing report. […]

Read More

Cybersecurity testing, penetration testing, cyber threats

TD SYNNEX Launches Cybersecurity Training Program

January 24, 2022 Zachary Comeau Leave a Comment

Tech distribution giant TD SYNNEX has announced a new cybersecurity program designed to close the skills gap and upskill new and existing cybersecurity professionals for the firm’s channel partners. According to the company, the Passaged Program aims to reduce the cybersecurity skills gap through its Placement and Upskill initiatives that are designed to place candidates […]

Read More

Microsoft warns of macros-based malware

Microsoft Now Disables Excel Macros By Default

January 24, 2022 Zachary Comeau Leave a Comment

Excel is now a little safer for organizations to use as Microsoft is making a once optional setting that disables the usage of Excel 4.0 macros the default. According to a Tech Community blog, the setting—which was rolled out as an optional setting in July 2021—is now the default when users open Excel 4.0 macros. […]

Read More

cloud enterprise software benefits, benefits of cloud-based enterprise system

Stacklet Survey Reveals 3 Inhibitors for Accelerated Cloud Adoption

January 21, 2022 TD Staff Leave a Comment

Cloud governance, compliance and security policies are top inhibitors for organizations looking to adopt the cloud this year, according to a study by Arlington, VA-based developer Stacklet. The survey included over 700 IT professionals, developers and solutions architects from a cross-section of mid-to large-size companies in industries such as software, financial services, government and computers. […]

Read More

Malware Symantec Daxin

Report: 2021 Malware, Ransomware Levels Already Surpassed 2020 Levels By End Of Q3

January 20, 2022 Zachary Comeau Leave a Comment

While new research shows a decrease in total perimeter malware detection volume in the third quarter from the record highs in the second quarter, there was still more malware activity through the first three quarters than all of 2020. The report from endpoint protection provider WatchGuard Technologies also found that nearly half of zero-day malware […]

Read More

Linux Foundation Open Source Program, software development

Linux Foundation Now Offering Open Source Software Development Certification

January 19, 2022 TD Staff Leave a Comment

The Linux Foundation, the nonprofit organization enabling innovation through open source, has announced the availability of three new training courses on its edX platform: Open Source Software Development: Linux for Developers (LFD107x), Linux Tools for Software Development (LFD108x), and Git for Distributed Software Development (LFD109x). The three courses can be taken individually or combined to […]

Read More

Active Directory Misconfigurations

Why Active Directory Attack Paths are the Secret to Many Successful Ransomware Attacks

January 19, 2022 Andy Robbins Leave a Comment

It’s no secret that most major enterprises across the globe use Microsoft Active Directory (AD) for identity and access management. This ubiquity is also one of the predominant reasons AD is such a popular and attractive target for adversaries. What remains a mystery to many enterprises, however, is how adversaries – including the malicious actors […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

This is What A Russian Cyberattack Looks Like

January 18, 2022 Zachary Comeau Leave a Comment

Many organizations that have valuable data or even come close to touching sectors of the U.S. government are likely fending off cyberattacks from nation-state countries, with Russia among the top such threats. Now, due to increasing tensions between Russia, Ukraine and western countries, IT and cybersecurity professionals should be on the lookout for sophisticated threat […]

Read More

Cisco Talos Cloud RATs

Hackers Using Public Cloud Infrastructure, RATs to Deploy Malware

January 14, 2022 Zachary Comeau Leave a Comment

A new report from Cisco Talos, the IT vendor’s security research team, details how hackers are increasingly using public cloud services like Azure and AWS that eliminates the need to host their own infrastructure. Specifically, researchers narrowed in on a fall 2021 campaign that utilized variants of known remote access trojans that were deployed and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • Page 67
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.