• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Cybersecurity Skills Gap

Cybersecurity Skills Gap Is Getting Worse, Report Says

August 2, 2021 Zachary Comeau Leave a Comment

Threat actors are becoming more skilled and attacks are increasing in level of sophistication, and the cybersecurity workforce can’t keep pace, according to a new study from the Information Systems Security Association. The study, conducted by ISSA and analyst firm Enterprise Strategy Group, found that organizations largely are not investing enough into their cybersecurity workforce […]

Read More

Data Breaches Average Cost

Report: Pandemic Led to More Expensive Data Breaches

July 30, 2021 Jess DeWitt Leave a Comment

According to a report by IBM security, data breaches hit record highs in terms of cost due to the COVID-19 pandemic. Even before the pandemic, data breaches were becoming a more frequent problem for organizations, but due to multiple factors, they became more problematic in the past year. IBM Security hired Ponemon Institute to compile […]

Read More

Ransom payments

Ransom Payments Are Declining

July 29, 2021 Alyssa Borelli Leave a Comment

Coveware reports Q2 ransom payments amounts are declining as ransomware becomes a national security priority.

Read More

Zero Trust, Leostream, AWS

Microsoft: Zero Trust Is Now A Top IT Priority

July 29, 2021 Zachary Comeau Leave a Comment

As organizations look for new ways to deal with the growing threat of cyberattacks, Zero Trust is increasingly becoming mainstream among IT and cybersecurity professionals, according to a new report from Microsoft. The IT giant has released its Zero Trust Adoption Report 2021 in which more than 1,200 security decision-makers were surveyed about their Zero […]

Read More

NSA Programming Languages

Make Cybersecurity Part Of Your Power Management Lesson Plan

July 29, 2021 Hervé Tardy Leave a Comment

IT infrastructure and cyber security considerations for protecting power devices from potential cyberattacks.

Read More

Is the Great Resignation Increasing Cloud App Security Risks?

July 28, 2021 Alyssa Borelli Leave a Comment

Departing employees, ahead of their departure, pose an increase in cloud app security risk as they upload files to personal apps.

Read More

SolarWinds Virtual Agent AI

SolarWinds Report: IT Pros, Leaders Aligning More on Cyber Risk

July 28, 2021 Zachary Comeau Leave a Comment

Eight months after the Russia-led highly sophisticated hacking campaign leveraging the SolarWinds Orion platform, the company has released its annual IT Trends Report, this one highlighting how IT professionals perceive their organization’s cyber risk management and mitigation after a tumultuous year. The report touches on everything from external threats, internal threats, remote work policies and […]

Read More

Exploited Vulnerabilities

Patch These Heavily Exploited Vulnerabilities Now

July 28, 2021 Zachary Comeau Leave a Comment

When a vendor or security researcher discloses a vulnerability in an IT product, organizations should be quick to apply the patch or implement a secure workaround to protect networks from bad actors that are quick to exploit that vulnerability. When those vulnerabilities are in widely used products from popular vendors like Citrix, Pulse, Microsoft and […]

Read More

Software Vulnerabilities

You Need To Look Out For These Software Vulns

July 27, 2021 Zachary Comeau Leave a Comment

Cybercriminals will look for any way into your networks, including phishing, brute force, supply chain attacks and software vulnerabilities, with the latter being especially dangerous since they’re built into software that we’re supposed to trust. They can be easy to find and exploit, allowing bad actors to take over an entire system, exfiltrate data and […]

Read More

Microsoft Security RSA Conference

Microsoft: How To Prevent NTLM Relay Attack

July 26, 2021 Zachary Comeau Leave a Comment

Microsoft has shared instructions on how to mitigate PetitPotam, an NT Lan Manager (NTLM) relay attack used against Windows domain controllers or servers. The company did not say if the vulnerability is currently being exploited. Microsoft called it a “classic” NTLM relay attack that allows an attacker to take over a domain controller or other […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 81
  • Page 82
  • Page 83
  • Page 84
  • Page 85
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.