• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Microsoft Security RSA Conference

Azure Cosmos DB Flaw Exposed Customer Data

August 27, 2021 Zachary Comeau Leave a Comment

Microsoft is warning thousands of its customers of a vulnerability in Azure that left customer data – including for several Fortune 500 companies – completely exposed. Cloud security company Wiz said in lengthy and detailed post that the flaw – dubbed Chaos DB – is in Azure’s Cosmos DB database. A successful exploit would give […]

Read More

iot security dangers, IoT dangers, IoT device security

What You Need To Know About New IoT Vulnerabilities

August 26, 2021 Zachary Comeau Leave a Comment

The IoT has long been thought to be full of gaping vulnerabilities for attackers to exploit, and it’s now becoming a reality as two recently vulnerability disclosures say millions of IoT devices could be at risk and allow attackers to spy on organizations or completely control affected devices. IoT Inspector was the first to disclose […]

Read More

PrintNIghtmare

Still Having A PrintNightmare?

August 25, 2021 Zachary Comeau Leave a Comment

When Microsoft released security patches earlier this month to address the vulnerabilities in Windows Print Spooler service, we thought the flaws known as PrigntNightmare were behind us. However, due to the very patch that Microsoft issued to keep cybercriminals from gaining admin privileges through this vulnerability and other changes, some admins are complaining of printing […]

Read More

Zero Trust

What is Zero Trust and How Do You Implement It?

August 25, 2021 Zachary Comeau Leave a Comment

Thanks to a continuous onslaught of nation-state cyberattacks, exploited vulnerabilities and ransomware, the term Zero Trust has been thrust into the mainstream, but the term isn’t new. In fact, it’s about a decade old, but the ideas and concepts behind the term are even older. However, there isn’t one Zero Trust solution or any one […]

Read More

Microsoft Security RSA Conference

CISA: Cybercriminals Targeting ProxyShell Flaws

August 23, 2021 Zachary Comeau Leave a Comment

System administrators and other IT professionals are urged to apply Microsoft’s May 2021 security updates as threat actors are actively exploiting a previous vulnerability in Microsoft Exchange Server. The U.S. Cybersecurity and Infrastructure Security Agency said over the weekend that multiple threat actors are exploiting three ProxyShell Vulnerabilities, which could allow an attacker to install […]

Read More

Zero Trust, Leostream, AWS

What IT Admins Can Learn From Microsoft’s U.S. Government Zero Trust Strategy

August 18, 2021 Zachary Comeau Leave a Comment

Microsoft this week published a blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersecurity, and the company’s guidelines should be a framework for any organization to strive towards. The blog comes amid a heightened awareness of cybersecurity […]

Read More

Hackers use morse code to evade detection

Hackers Used Morse Code In This Phishing Attack

August 18, 2021 Alyssa Borelli Leave a Comment

Hackers’ are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

Read More

cyberattacks against school districts to increase

How to Mitigate Cyberattacks Against School Districts

August 18, 2021 Alyssa Borelli Leave a Comment

Cybercriminals may have their sights set on school districts in 2021-22 academic year; parents fear leak of student data.

Read More

Cisco

Cisco Acquires Cloud Monitoring Startup Epsagon

August 17, 2021 Alyssa Borelli Leave a Comment

Cisco acquires cloud monitoring startup to better track the performance of the components that make up a firm’s digital infrastructure.

Read More

IoT Security

Report: Vulnerability Allows Hackers to Spy Via IoT Devices

August 17, 2021 Zachary Comeau Leave a Comment

A newly discovered vulnerability that could affect 83 million IoT devices allows an attacker to listen to live audio, watch real-time video data, compromise device credentials for further attacks or remotely control devices, according to new research. According to Mandiant, a subsidiary of cybersecurity firm FireEye, the IoT vulnerability is in the ThroughTek Kalay network, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 78
  • Page 79
  • Page 80
  • Page 81
  • Page 82
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.