• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Crowdstrike Charlotte AI

CrowdStrike Releases Free Incident Response Tracker

January 13, 2022 Zachary Comeau Leave a Comment

Cybersecurity giant CrowdStrike has released a free incident response tracker to help IT and security teams document indicators of compromise, compromised systems and a timeline of important events during its forensic analysis of an attack. The company calls the tool the CrowdStrike Incident Response Tracker, which is essentially an organized spreadsheet to help teams document […]

Read More

Malware Symantec Daxin

Two-Thirds of Malware Downloads Came From Cloud Apps in 2021

January 12, 2022 TD Staff Leave a Comment

Malware continues to grow along with other malicious payload delivered by cloud applications, according to Netskope’s latest Cloud and Threat Spotlight for January 2022. The SASE provider analyzed year-over-year data highlighting that attacker are achieving more success delivering malware payloads to their victims. The research showed more than two-thirds of malware data came from cloud […]

Read More

DDoS, NETSCOUT Arbor Insight

DDoS Attacks Combined With Extortion Attempts Exploded in Q4

January 12, 2022 Zachary Comeau Leave a Comment

According to new data from web infrastructure and security firm Cloudflare, the amount of DDoS attacks being layered with a ransom demand are increasing significantly. The company’s DDoS Attack Trends report for the fourth quarter of 2021 revealed a ransom DDoS attack increase of 29% for the year and a whopping 175% for the quarter. […]

Read More

10 Memes That Speak To The Struggles of Working in IT In 2022

January 12, 2022 Zachary Comeau Leave a Comment

Most of the time, we at My TechDecisions are hard at work bringing you tech professionals news and insights that can help you do your job managing the technology at your organization. However, we also recognize that working in IT can be stressful—especially over the last two years with the migration to remote work and […]

Read More

NSA Programming Languages

Honeywell Expands OT Cybersecurity Portfolio With Acalvio Technologies

January 11, 2022 TD Staff Leave a Comment

Honeywell and Acalvio Technologies have launched a new solution designed to detect known and unknown (zero-day) attacks across the operational technology (OT) environments in commercial buildings. Honeywell Threat Defense Platform (HTDP) powered by Acalvio uses “sophisticated active defense – featuring autonomous deception tactics to outsmart attackers,” providing “high fidelity threat detection,” according to the company. […]

Read More

Microsoft January Patch Tuesday

Admins Have 122 Microsoft Bugs To Patch This Month

January 11, 2022 Zachary Comeau Leave a Comment

Microsoft has released patches for nearly 100 vulnerabilities this Patch Tuesday, including three Exchange remote code execution bugs and an HTTP protocol stack remote code execution vulnerability. Despite the unusually large amount of patches to start the year, none are listed as being actively exploited. However, six are listed as publicly known at the time […]

Read More

Proofpoint CISO, CISOs cyberattack

Cyberattacks Increased By 50% In 2021

January 11, 2022 Zachary Comeau Leave a Comment

Not that anyone assumed differently, but cyberattacks proliferated the internet in 2021, with researchers noting 50% more attacks per week on corporate networks compared to 2020, according to cybersecurity firm Check Point. The 2021 data comes just a few months after the company reported in October a 40% increase in cyberattacks globally. However, the fourth […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

A Chinese Ransomware Operator Is Leveraging Log4j Bugs, VMWare Horizon

January 11, 2022 Zachary Comeau Leave a Comment

The IT and cybersecurity community sounded the alarm last month when researchers discovered vulnerabilities in Log4j, the ubiquitous java logger used by a wide range of tech products. The tool has been patched and vendors are quickly deploying its own patches for products that use the tool, but the situation is not getting much better […]

Read More

Log4J SBOM

Log4j Highlights the Need for a Software Bill of Materials; Here’s How to Create One

January 11, 2022 Bren Briggs, VP of DevOps and Cybersecurity at Hypergiant. Leave a Comment

Just days into the new year and the cybersecurity community is already playing catch up thanks to the recent Log4j vulnerability which illuminated major setbacks in how organizations deal with its own software and open-source packages on which its relies on. In particular, organizations have been caught off guard in auditing its own systems, giving […]

Read More

Royal Ransomware

Are Ransomware And Terrorism Threats Equal?

January 10, 2022 Alyssa Borelli Leave a Comment

Almost two-thirds (60%) of IT decision makers believe ransomware threats should be prioritized at the same level as terrorism, according to latest research by Venafi, a Salt Lake City-based provider of machine identify management solutions. The research comes after the U.S Department of Justice raised the threat level of ransomware following the Colonial Pipeline attack […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 64
  • Page 65
  • Page 66
  • Page 67
  • Page 68
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.