• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

News

Popular Tags within: News

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
U.S. Cybersecurity Strategy

The Five Pillars of the New U.S. Cybersecurity Strategy

March 6, 2023 Zachary Comeau Leave a Comment

The Biden-Harris Administration has released its five-pronged National Cybersecurity Strategy designed to secure the digital ecosystem by putting more of the burden for cybersecurity on tech organizations and encouraging long-term investments in security. The Administration’s vision is meant to make the country’s digital ecosystem defensible, resilient and values aligned. The new strategy comes in the […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New AI-Driven Identity Threat Detection and Response Model for SOC Solution

March 6, 2023 Zachary Comeau Leave a Comment

Cybersecurity giant Palo Alto Networks is launching its new Identity Threat Detection and Response module for its autonomous security operations center (SOC) solution Cortex XSIAM.   The Santa Clara, Calif.-based firm says the new solution enables customers to ingest user identity and behavior data and deploy AI technology to help detect identity-driven attacks within seconds, […]

Read More

Royal Ransomware

FBI, CISA Warn of Royal Ransomware Targeting Critical Infrastructure

March 3, 2023 Zachary Comeau Leave a Comment

U.S. agencies are warning critical infrastructure organizations to be on the lookout for Royal ransomware, a financially motivated threat actor that has been targeted manufacturing, communications, healthcare and education entities since September 2022. In a joint advisory, the FBI and U.S. Cybersecurity and Infrastructure Security Agency say the Royal ransomware actors have compromised U.S. and […]

Read More

Dante Studio 2.0

Audinate Launches Dante Studio 2.0 Software Update

March 3, 2023 TD Staff Leave a Comment

Audinate, developer of the professional Dante AV-over-IP solution, announced the Dante Studio 2.0 software update and new subscription pricing. Dante Studio is a suite of software tools comprising Dante RX, Dante TX, and Dante Video Viewer. The suite brings Dante AV video directly into a PC from Dante AV Ultra or Dante AV-H cameras, encoders […]

Read More

Phishing, Email security

Phishing Remains a Favorite Hacking Tool as New Methods Emerge

March 3, 2023 Zachary Comeau Leave a Comment

Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]

Read More

ChatGPT, AI, Microsoft, Work Trend Index, Generative AI

Get Ready to See More ChatGPT Integrations

March 2, 2023 Zachary Comeau Leave a Comment

OpenAI, the artificial intelligence research and development company and creators of conversational chatbot model ChatGPT, have launched an API for both ChatGPT and automatic speech recognition system Whisper. Models for both ChatGPT and Whisper are now available on OpenAI’s API, giving developers access to language and speech-to-text capabilities. According to OpenAI, the company has achieved […]

Read More

Cybersecurity testing, penetration testing, cyber threats

No Organization Is an Island: How to Protect Against Supply Chain Attacks

March 2, 2023 Dirk Schrader Leave a Comment

Every organization interacts with other organizations: suppliers, partners, customers, government agencies and more. As a result, you can suffer a breach even though your organization was not directly targeted. For example, adversaries were able to release the infamous NotPetya malware to thousands of companies worldwide by compromising the supplier of a popular accounting software solution. […]

Read More

Barco ClickShare Conference

UC Management Company Utelogy Joins Barco ClickShare Alliance

March 1, 2023 Zachary Comeau Leave a Comment

Utelogy, a provider of management, monitoring, automation and analytics software for unified communications systems, is joining the Barco ClickShare Alliance Program as a validated technology partner. According to the Los Angeles, Calif.-based company, this extends the capabilities of the Utelogy platform for managing audiovisual and unified communications devices and peripherals to include Barco’s ClickShare Conference […]

Read More

CISA Software Security

What CISA Learned After Conducting a Red Team Assessment of a Large Critical Infrastructure Organization

March 1, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory that describes a CISA red team assessment of a large critical infrastructure organization with a mature cyber posture, with the goal of sharing its key findings to help IT and security professionals improve monitoring and hardening of networks. According to the advisory, […]

Read More

MIcrosoft Entra External ID

Microsoft Launches Intune Suite for Unified Endpoint Management, Security

March 1, 2023 Zachary Comeau Leave a Comment

Microsoft is launching the Microsoft Intune Suite, a new unified endpoint management and security bundle designed to simplify endpoint management experiences, improve an organization’s security posture and improve the user experience. According to a Microsoft blog written by Michael Wallent, corporate vice president, of the company’s enterprise mobility management products, the new Intune Suite is deeply […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Interim pages omitted …
  • Page 337
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.