• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Log4j Vulnerability

What You Need To Know About The Log4j Vulnerability

December 13, 2021 Zachary Comeau Leave a Comment

The Log4J vulnerability discovered late last week continues to make lives extremely busy for IT and cybersecurity professionals and software vendors rush to investigate if their products are vulnerable and push patches out to customers while those customers investigate the hundreds of apps their organization uses to determine how exposed they are. The widely used […]

Read More

Fortinet Vulnerability, Fortigate

Critical Vulnerability in Java Logging Library Log4j Is Being Actively Exploited

December 10, 2021 Zachary Comeau Leave a Comment

Security researchers have discovered a new easy-to-exploit zero-day vulnerability in the ubiquitous Java logging library Apache Log4j 2 that could give attackers the ability to execute unauthenticated remote code execution. The U.S. Cybersecurity and Infrastructure Security Agency, along with dozens of cybersecurity providers, have issued alerts and advisories of the vulnerability, CVE-2021-44228, which they warn […]

Read More

IoT Security

Just 42% Of Security Pros Can Detect IoT, OT Vulnerabilities

December 9, 2021 Zachary Comeau Leave a Comment

According to a new Microsoft study in conjunction with the Ponemon Institute, the Internet of Things and new innovations in operational technology is becoming critical for business, but simultaneously increasing an organization’s cyber risk. Researchers surveyed more than 600 IT, cybersecurity and OT security experts across the U.S., and found that many organizations are making […]

Read More

CISO Burnout

The Great Resignation Is Fueling An Emerging Cybersecurity Risk

December 8, 2021 Zachary Comeau Leave a Comment

The effects of the pandemic, leading to what is being called The Great Resignation, is having a severe impact on the global workforce as companies report difficulties finding and retaining talent. However, the same issue is also having an impact on the cybersecurity posture of these organizations, according to a new report from human-centric security […]

Read More

CompTIA logo

Test Takers Sought for CompTIA Linux+ Beta Exam

December 8, 2021 TD Staff Leave a Comment

IT professionals with a year or more of on-the- job experience working with Linux servers are invited to serve as beta testers for a new version of the CompTIA Linux+ certification exam, CompTIA, the nonprofit association for the IT industry and workforce. CompTIA Linux+ certification is intended for early career IT professionals who support Linux systems in […]

Read More

Crowdstrike Charlotte AI

CISA Selects CrowdStrike to Protect its Endpoints & Workloads

December 7, 2021 TD Staff Leave a Comment

CrowdStrike Inc., a provider of cloud-based endpoint and workload protection, announced the Cybersecurity and Infrastructure Security Agency (CISA) has selected it as one of the major platforms to support the Executive Order endpoint detection and response initiative. CrowdStrike brings cloud-native AI-driven power of the CrowdStrike Falcon platform to secure critical endpoints and workloads for the […]

Read More

Expel MDR for Kubernetes, cloud

How Collaboration Can Minimize Exposure 

December 6, 2021 Thomas LaRock Leave a Comment

Cybercrime has reached a new peak with the onslaught of ransomware attacks and data breaches in the last several months. As organizations continue to support distributed and remote work, it’s vital IT leaders and tech pros are appropriately addressing risk and ensuring security policies and procedures are up to par.   SolarWinds recently revealed findings of […]

Read More

Password Management

More Than 90% Of IT Leaders Reuse Passwords, Survey Shows

December 6, 2021 Zachary Comeau Leave a Comment

Password security and good credential hygiene are some of the most important components of any organization’s cybersecurity posture, but many are still engaging in risky password practices that threaten their organization’s network security. That’s even true for IT, as 92% of IT decision makers reported reusing passwords across multiple sites—even as cyberattacks escalate due to […]

Read More

Zero Trust, Leostream, AWS

Research: Zero Trust Expected to Double Cybersecurity Efficacy

December 2, 2021 Zachary Comeau Leave a Comment

If you were having doubts about the efficacy of a zero trust approach to cybersecurity, recently released research suggests that such a network architecture is expected to double the efficacy of cybersecurity products. The research, conducted by Osterman Research on behalf of cybersecurity firm Symmetry Systems, found from a survey of 125 IT and security […]

Read More

IKEA EMAIL HIJACKING INCIDENT

Ikea Investigates Into Internal Email Hijacking Incident

December 2, 2021 Alyssa Borelli Leave a Comment

Multinational furniture maker Ikea announced it is investigating a cyber incident which took place on its Microsoft Exchange server. Malicious emails were sent around the company appearing to be a genuine “reply all” to an email chain, according to documents shared with BleepingComputer. No customer data was compromised as result of the incident. Other Ikea […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 67
  • Page 68
  • Page 69
  • Page 70
  • Page 71
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.