• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

News

Popular Tags within: News

Collaboration Cloud Hybrid Work Education UCC Microphones AI Mass Notification IT Security
Zero Trust

What is Zero Trust and How Do You Implement It?

August 25, 2021 Zachary Comeau Leave a Comment

Thanks to a continuous onslaught of nation-state cyberattacks, exploited vulnerabilities and ransomware, the term Zero Trust has been thrust into the mainstream, but the term isn’t new. In fact, it’s about a decade old, but the ideas and concepts behind the term are even older. However, there isn’t one Zero Trust solution or any one […]

Read More

Intel’s chip-making deal

What Intel’s Chip-Making Deal Means

August 24, 2021 Alyssa Borelli Leave a Comment

Intel’s chip-making deal is a step to create a more robust semiconductor ecosystem in the U.S., for years to come, as part of DoD project.

Read More

NETSCOUT nGeniusEDGE Server

Which Jobs, Cities Allow For Most Hybrid Work Flexibility?

August 24, 2021 Zachary Comeau Leave a Comment

New Robert Half survey suggests that jobs in technology, marketing and near major economic hubs offer more hybrid work flexibility.

Read More

Microsoft Security RSA Conference

CISA: Cybercriminals Targeting ProxyShell Flaws

August 23, 2021 Zachary Comeau Leave a Comment

System administrators and other IT professionals are urged to apply Microsoft’s May 2021 security updates as threat actors are actively exploiting a previous vulnerability in Microsoft Exchange Server. The U.S. Cybersecurity and Infrastructure Security Agency said over the weekend that multiple threat actors are exploiting three ProxyShell Vulnerabilities, which could allow an attacker to install […]

Read More

Featured Video Play Icon Content from Our Sponsor

How One University Made Their Hybrid Learning Vision a Reality with Sennheiser

August 20, 2021 TD Staff Leave a Comment

In this video edition of The Collaboration Space podcast, we discuss how AVI-SPL and Sennheiser helped one university create a hybrid environment.

Read More

Zero Trust, Leostream, AWS

What IT Admins Can Learn From Microsoft’s U.S. Government Zero Trust Strategy

August 18, 2021 Zachary Comeau Leave a Comment

Microsoft this week published a blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersecurity, and the company’s guidelines should be a framework for any organization to strive towards. The blog comes amid a heightened awareness of cybersecurity […]

Read More

IoT Security

Report: Vulnerability Allows Hackers to Spy Via IoT Devices

August 17, 2021 Zachary Comeau Leave a Comment

A newly discovered vulnerability that could affect 83 million IoT devices allows an attacker to listen to live audio, watch real-time video data, compromise device credentials for further attacks or remotely control devices, according to new research. According to Mandiant, a subsidiary of cybersecurity firm FireEye, the IoT vulnerability is in the ThroughTek Kalay network, […]

Read More

Hybrid Cloud Pain Points

Top 4 Hybrid Cloud Systems Management Pain Points and How to Solve Them

August 17, 2021 William Malik Leave a Comment

The appeal of cloud computing is financial: rather than buying infrastructure, rent it. The problem with this financial solution is it distracts the cloud user from the responsibilities that remain after moving the applications out of the enterprise – responsibilities called systems management comprise IT Infrastructure and Operations, or I&O. This article reviews some of […]

Read More

John Oliver Takes Up Ransomware On “Last Week Tonight”

August 16, 2021 Zachary Comeau Leave a Comment

System administrators, IT professionals and cybersecurity experts have been sounding the alarm over ransomware and the increasing frequency of attacks over the last few months, and their message is now beginning to be picked up by mainstream media. Ransomware is now rising to a national security level thanks to recent attacks against Colonial Pipeline, JBS […]

Read More

Patch the Print Nightmare Vulnerabilities Now

August 13, 2021 Zachary Comeau Leave a Comment

Much has been made of the vulnerabilities recently discovered in the Windows Print Spooler Service and Microsoft’s patches for the issue. Now, systems that remain unpatched are being attacked by ransomware operators. In a new report, Cisco Talos says a threat actor is exploiting those vulnerabilities – dubbed PrintNightmare – to spread laterally across a […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 162
  • Page 163
  • Page 164
  • Page 165
  • Page 166
  • Interim pages omitted …
  • Page 337
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.