• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Blogs

Russia Ukraine Cyberattacks

Cybersecurity Experts: Ukraine, Russia Crisis Could Result in U.S. Cyberattacks

February 16, 2022 Zachary Comeau Leave a Comment

As the world waits to see what unfolds in Ukraine, cybersecurity professionals are urging western governments and organizations to be prepared for serious cyberattacks coming from Russia and its allies. These warnings come from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) as well as private sector cybersecurity software providers like Mandiant that have raised […]

Read More

Azure AD Unmanaged Accounts

This Azure AD Authentication Method Can Help With Zero Trust

February 16, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure Active Directory certificate-based authentication across its commercial and U.S. government clouds, a response to President Joe Biden’s executive order on cybersecurity designed to push the government to zero trust. The offering is designed to help government customers meet phishing-resistant MFA using the PIV/CAC cards, and it can […]

Read More

CISA Warns of Increased Globalized Threat of Ransomware

February 16, 2022 Alyssa Borelli Leave a Comment

In 2021, 14 of the 16 U.S. critical infrastructure sectors were hit with ransomware, according to the CISA, FBI and NSA in a new report. And it’s not just happening the U.S., Australia’s critical infrastructure entities have been hit, as well as in the U.K. The education sector was one of the top U.K. sectors […]

Read More

VMware Vulnerabilities

VMware: Patch These Vulnerabilities Immediately

February 15, 2022 Zachary Comeau Leave a Comment

VMware is urging customers to immediately patch vulnerabilities in ESXi, Workstation, Fusion and Cloud Foundation running in on-premises or co-located settings. The patches fix a total of five CVEs in those products that were disclosed during the Tianfu Cup, a Chinese security event that VMware participates in. According to the company, the flaws were reported […]

Read More

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Introduces Chrome OS Flex To Replace Windows, macOS On Older Devices

February 15, 2022 Zachary Comeau Leave a Comment

Google has introduced a new version of Chrome OS that can turn PCs and Macs into a Chromebook, and the software designed for businesses and schools will be free to download, the company says. In a blog, the company says Chrome OS Flex will be fully compatible with Google’s cloud-based management and helps modernize endpoints […]

Read More

Proofpoint CISO, CISOs cyberattack

Red Canary Adds 24/7 Remediation, Protection Features

February 15, 2022 Zachary Comeau Leave a Comment

Threat detection provider Red Canary has added new capabilities and active remediation features to its cybersecurity offerings, including protections for systems beyond the endpoint and a new active 24/7 threat response offering. According to the company, the new threat investigation and active remediation features are designed to help customers investigate, triage and respond to threats, […]

Read More

Amazon facial recognition, police

Privacy Claims, Lawsuits Related to Biometrics Will Reach $8 Billion in 2025

February 15, 2022 Zachary Comeau Leave a Comment

Lawsuits and claims related to biometric information processing and cyber-physical systems will reach $8 billion in fines and settlements by 2025 as privacy budgets are also expected to grow significantly, according to IT research firm Gartner. AI-enabled technologies, smart buildings, smart cities and other cyber-physical systems that capture biometric information are growing, but that information […]

Read More

Young man with vr headset

Security Vulnerabilities Found in VR Headsets

February 14, 2022 TD Staff Leave a Comment

Voice command features on virtual reality (VR) headsets pose vulnerabilities and could lead to major privacy eavesdropping attacks, according to researchers at Rutgers University-New Brunswick. The research shows hackers could use popular AR/VR headsets with built in motion sensors to record subtle, speech-associated facial dynamics to steal sensitive information communicated via voice-command, including credit card […]

Read More

CISA Software Security

This CISA Resource Can Help Protect You From Actively Exploited Bugs

February 14, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been extremely active in helping both the public sector and private sector respond to cybersecurity threats, and is often one of the leading voices when new threats emerge. The agency, part of DHS, has released guides, advisories and other resources on current and historical threats, and […]

Read More

Utelogy IR Partnership

Utelogy Partners with IR to Offer Improved Meeting Analytics

February 14, 2022 Alyssa Borelli Leave a Comment

Utelogy, the Los Angeles, Calif.-based provider of UC, AV and device management, monitoring and analytics has announced a partnership with IR, a global performance management and analytics provider for critical communication and collaboration, IT infrastructure and payment ecosystems. Headquartered in Sydney Australia, IR works with the world’s largest organizations providing them with insights, monitoring and support. […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 123
  • Page 124
  • Page 125
  • Page 126
  • Page 127
  • Interim pages omitted …
  • Page 295
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.