• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Google, AI, Google Security AI Workbench

CIS, Google Partner to Help Secure Public Sector

April 24, 2023 Zachary Comeau Leave a Comment

The Center for Internet Security and Google are partnering to create the CIS & Google Cloud Alliance to help advance security and resilience for the broader technology ecosystem, with an emphasis on the public sector. According to the organizations, the alliance will combine the companies’ experience to offer greater security to public sector entities. The […]

Read More

Zero Trust, Leostream, AWS

What is Holding Up Your Zero Trust Implementation?

April 21, 2023 Zachary Comeau Leave a Comment

Despite a growing consensus that zero trust security policies can help keep organizations secure, companies are struggling with legacy technology and the associated complexities and compatibility issues as they also look to modernize their infrastructure. According to new research from business management consulting firm Deloitte, legacy systems and environments are the greatest challenge to adopting […]

Read More

Cycode Application Security Orchestration and Correlation (ASOC) dashboard

Cycode Launches Application Security Orchestration and Correlation

April 21, 2023 Alyssa Borelli Leave a Comment

Cycode, the San Francisco-based software supply chain security solutions provider, is launching of Cycode Application Security Orchestration and Correlation (ASOC) to provide security teams consistent visibility into the various AppSec tools that are used in modern software delivery pipelines. According to the company, full visibility of all AppSec tooling allows for greater control over pipeline […]

Read More

ChatGPT, IT, Policies, AI Tools, Data

Should IT Block the Use of ChatGPT, Generative AI Tools?

April 20, 2023 Zachary Comeau Leave a Comment

With ChatGPT and other generative AI tools being integrated throughout enterprise software, organizations should act now to formulate an enterprise-wide strategy to deal with trust, risk and security issues arising from the rapidly developing field of generative AI, with blocking ChatGPT altogether a viable option, according to Gartner. The analyst firm published a Q&A featuring […]

Read More

3CX Hack Supply Chain attack compromise

‘Cascading Supply Chain Compromise’ Led to 3CX Compromise

April 20, 2023 Zachary Comeau Leave a Comment

The compromise that led to the supply chain attack leveraging the 3CX desktop app was actually another supply chain compromise, according to cybersecurity forensics firm Mandiant. The Google-owned company published a blog detailing the supply chain compromise that affected the 3CX desktop app, which was allegedly perpetrated by a North Korean entity. However, the 3CX […]

Read More

Dell, Cybersecurity, Security, Zero Trust, Project Fort Zero

Dell Technologies Accelerates Zero Trust Adoption with New Ecosystem

April 19, 2023 Alyssa Borelli Leave a Comment

To help private and public sector organizations simplify Zero Trust adoption, Dell is building a new ecosystem. It will bring together more than 30 leading technology and security companies to create a unified solution across infrastructure platforms, applications, clouds and services. Together with the Maryland Innovation Security Institute (MISI), Zero Trust Center of Excellence, Dell […]

Read More

Subdomain Hijacking, http domain concept background

One in Five DNS Records are Susceptible to Subdomain Hijacking

April 18, 2023 TD Staff Leave a Comment

CSC, the enterprise domain name registrar and security threat intelligence providers’ latest report found that over 21% of DNS records point to content that does not resolve; thus, leaving many companies vulnerable to subdomain hijacking. Additionally, over 277,000 (63%) show error status codes such as “404 not found” or “502 bad gateway.” According to Wilmington, […]

Read More

ChatGPT, AI, Microsoft, Work Trend Index, Generative AI

Why ChatGPT’s Versatility Makes it a Game-Changer in the Competitive Cloud Market

April 18, 2023 Satish Subramani Leave a Comment

Microsoft is reportedly investing a whopping $10 billion in OpenAI, the firm behind ChatGPT and DALL-E. The eight-year-old firm with no mainstream product or revenue model has dominated the news headlines ever since it released an AI Chatbot to market in November 2022. So, what is ChatGPT and what can it do? What is ChatGPT […]

Read More

Zero Trust, ZTNA, Netskope

Netskope Claims 100% Legacy VPN Replacement With ZTNA Next

April 18, 2023 Zachary Comeau Leave a Comment

SASE provider Netskope later this year plans to launch ZTNA Next, a new zero trust solution designed to support all relevant application use cases, including on-premise-hosted-VoIP thanks to an integration with the company’s software-based unified SASE client. According to the Santa Clara, Calif.-based firm, this is an evolution of the company’s zero trust network access […]

Read More

Microsoft Exchange Throttling Blocking

What is Going on With Microsoft Exchange Server Throttling and Blocking?

April 17, 2023 Zachary Comeau Leave a Comment

Microsoft is hoping to address the security issue of emails sent to Exchange online from unsupported and unpatched Exchange Servers by enabling a transport-based enforcement system in Exchange Online that will throttle and then block emails from an unsupported server. The end goal is to encourage Microsoft customers to stop using persistently vulnerable versions of […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.