• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
CISA NSA VPN

NSA, CISA Release VPN Selection, Hardening Guidance

September 30, 2021 Zachary Comeau Leave a Comment

The U.S. National Security Agency and Cybersecurity and Infrastructure Security Agency have jointly released a new guidance resource on selecting and hardening virtual private network (VPN) solutions to help organizations address security risks associated with the popular tools. Especially in this new age of remote/hybrid work, VPNs have become a popular resource for organizations with […]

Read More

NSA Programming Languages

CompTIA Cybersecurity Report: New Mindset Needed

September 29, 2021 Alyssa Borelli Leave a Comment

CompTIA’s 2021 State of Cybersecurity report calls for a new Zero Trust mindset in wake of cloud-computing.

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

Microsoft Warns Of New AD FS Compromise By Sunburst Hackers

September 28, 2021 Zachary Comeau Leave a Comment

Microsoft says it has discovered another piece of malware used by the alleged Russia-based hacking group responsible for the SolarWinds Orion compromise that creates a post-exploitation backdoor and is used to maintain persistence in a victim’s environment. In a blog post, the Microsoft Threat Intelligence Center called this malware FoggyWeb and says it is used […]

Read More

Linux 2021 Open Source Job Report

Linux Job Report: Hiring is Rebounding In The Wake Of The Pandemic

September 28, 2021 Alyssa Borelli Leave a Comment

Linux’s 9th annual Open Source Jobs Report reveals cloud-native skills are more in demand than any other technical discipline.

Read More

Microsoft January Patch Tuesday

Microsoft Introduces Emergency Mitigation Tool For Exchange Server

September 27, 2021 Zachary Comeau Leave a Comment

Microsoft is introducing a new security feature in Exchange Server designed to protect against security threats that have known mitigations. According to the company, the Emergency Mitigation feature is a built-in version of the Exchange On-premises Mitigation Tool (EOMT) that works with the cloud-based Office Config Service (OCS) to provide protection against known threats. It’s […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Study: Remote Work Directly Linked To Cyberattacks

September 24, 2021 Zachary Comeau Leave a Comment

Reports and research on the habits of organizations embracing remote or hybrid work continue to shed light on the inherent cybersecurity risks, including a recent Tenable study that found 74% of organizations attribute recent business-impacting cyberattacks to remote work tech vulnerabilities. According to the report, conducted with Forrester, cloud services and apps, personal devices and […]

Read More

DDoS, NETSCOUT Arbor Insight

Report: DDoS Attacks Increasing As Record-Setting Year Is Anticipated

September 23, 2021 Zachary Comeau Leave a Comment

It’s not just ransomware and supply chain cyberattacks that IT pros have to defend against, according to a new report that indicates DDoS attacks are also increasing in frequency and scope. According to cybersecurity company Netscout, there were 5.4 million distributed-denial-of-service (DDoS) attacks in the first half of 2021, which is an 11% increase from […]

Read More

Phishing Success rates

Tessian Report: Top Malicious Email Phishing Techniques Used By Cybercriminals

September 22, 2021 Alyssa Borelli Leave a Comment

Tessian report reveals two million malicious emails bypassed email defenses and the most common phishing techniques used by cybercriminals.

Read More

Cybersecurity testing, penetration testing, cyber threats

This Could Be Why You’re Struggling to Find Cybersecurity Help

September 21, 2021 Zachary Comeau Leave a Comment

One of the prevailing stories in cybersecurity over the last few years has been the apparent shortage of cybersecurity talent, with some linking that workforce gap to the growing amount and frequency of cyberattacks on government and enterprises with bad actors appearing to be one step ahead of the cybersecurity industry. Now, the cybersecurity industry, […]

Read More

Elon Musk Cryptocurrency bitcoin scam

Beware Of This Elon Musk-Themed Cryptocurrency Giveaway Scam

September 20, 2021 Alyssa Borelli Leave a Comment

If you “donate” bitcoin, don’t expect to get anything in return with this “Elon Musk Mutual Aid Fund” cryptocurrency phishing scam.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 75
  • Page 76
  • Page 77
  • Page 78
  • Page 79
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.