• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud Software Videoconferencing AI UCC Automation IT Security Cloud Computing
Infosec, Cybersecurity Awareness

Check Point Survey: CISOs’ Confidence In Security Dwindles As Cyber Attacks Increase

November 3, 2021 Alyssa Borelli Leave a Comment

CISOs are starting to express dwindling confidence in protecting all attack vectors, according to research by Check Point. Check Point’s global survey of CISOs indicated “CISOs’ confidence in security goes down as the number of cyber attacks, assets to secure, and the number of vendors’ solutions used in their environment increases.” At least 92% of […]

Read More

What Microsoft Introduced During Ignite

November 3, 2021 Zachary Comeau Leave a Comment

Microsoft Ignite is taking place this week, and the company has announced dozens of new tools and features designed to help organizations improve productivity, enable working from anywhere, digitize more processes and shore up their security. Microsoft, a giant in the IT vendor space, has innovated rapidly over the course of the pandemic to bring […]

Read More

Smishing and Phishing PKI

Concerned About Phishing and Smishing Attacks? PKI Can Help.

November 3, 2021 Ed Giaquinto Leave a Comment

Just about everyone is familiar with the concept of “phishing” attacks. Scammers and cybercriminals have been using them for nearly as long as email has been around, sending thousands (even millions) of emails designed to trick recipients into giving away money, personal information, or other valuables. Phishing was one of the earliest cyberattacks based on […]

Read More

Data Center Automation

Gartner: Data Center Automation Will Advance Significantly by 2025

November 1, 2021 Zachary Comeau Leave a Comment

Within the next five years. half of all data centers will deploy advanced artificial intelligence and machine learning technologies, resulting in a significant efficiency boost, according to IT research firm Gartner. By 2025, half of cloud data centers will use advanced robots with AI and machine learning capabilities, which will increase operating efficiency by 30%, […]

Read More

Microsoft Security RSA Conference

How Microsoft Is Partnering With Community Colleges To Close the Cybersecurity Workforce Gap

October 29, 2021 Zachary Comeau Leave a Comment

Microsoft, in a bid to close the U.S. cybersecurity skills gap, is leveraging the help of the country’s community colleges with the goal of recruiting 250,000 cybersecurity professionals into the workforce by 2025. According to the company, that represents half of the country’s cybersecurity workforce shortage. Those professionals will work for both Microsoft and other […]

Read More

Most Common Active Directory Misconfigurations

The 3 Most Common Misconfigurations in Microsoft Active Directory (and How to Fix Them)

October 29, 2021 Andy Robbins Leave a Comment

Microsoft Active Directory (AD) is one of, if not THE, most critical services used by organizations of all sizes. In fact, for roughly 90% of Global Fortune 1000 companies, AD is the primary method utilized for seamless authentication and authorization when connecting and managing individual endpoints inside corporate networks. Research has revealed that AD also […]

Read More

iSTAR Ultra G2’s Cyber-Hardened Core Helps Combat The Most Sophisticated Hackers

October 28, 2021 Zachary Comeau Leave a Comment

The new Tyco Software House iSTAR Ultra G2 is a powerful, cyber-hardened network door controller that supports up to 32 readers. Built using a Trusted Execution Environment (TEE), iSTAR Ultra G2’s rock-solid, hardware-based cyber protection guarantees confidentiality of code and data, and includes advanced enterprise features such as OSDP encrypted, two-way reader communications and peer-to-peer clustering. […]

Read More

HP Poly

Report: 83% Of IT Professionals Say Remote Work, Security Straining IT Staff

October 28, 2021 Zachary Comeau Leave a Comment

A new report from HP Wolf Security finds that shadow IT is increasing and security incidents are rising as remote and hybrid workers get more comfortable settling into their home offices while commuting to the office a few days week. According to the report, HP Wolf Security report: Out of Sight & Out of Mind, […]

Read More

Yubico USB-C NFC

Yubico Releases USB-C, NFC Security Key

October 26, 2021 TD Staff Leave a Comment

Security key maker Yubico has released new USB-C and near-field communication (NFC) security keys to meet demand as more devices leverage USB-C. The company’s Security Key C NFC is the latest to join its portfolio of security keys, offering FIDO-only support in a USB-C form factor with NFC capabilities. This joins the Security Key NFC, […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

SolarWinds Hackers Are Targeting IT Services Providers and Their Customers

October 25, 2021 TD Staff Leave a Comment

Microsoft says the same Russian hacking group behind the compromise of the SolarWinds Orion platform is targeting IT service providers and cloud technology resellers to leverage their privileged access to end customer networks. In a series of blogs, Microsoft says the threat actor it calls Nobelium is targeting cloud service providers, managed service providers and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 71
  • Page 72
  • Page 73
  • Page 74
  • Page 75
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.