• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Blogs

Microsoft Security RSA Conference

CISA: Cybercriminals Targeting ProxyShell Flaws

August 23, 2021 Zachary Comeau Leave a Comment

System administrators and other IT professionals are urged to apply Microsoft’s May 2021 security updates as threat actors are actively exploiting a previous vulnerability in Microsoft Exchange Server. The U.S. Cybersecurity and Infrastructure Security Agency said over the weekend that multiple threat actors are exploiting three ProxyShell Vulnerabilities, which could allow an attacker to install […]

Read More

Digital Transformation

Lessons On Implementing Digital Transformation

August 20, 2021 Alyssa Borelli Leave a Comment

Business leaders can learn a few tips when it comes to digital transformation strategy from former CEO and executive chairman of IBM.

Read More

auditing your tech stack

What To Ask When Auditing Your Tech Stack

August 19, 2021 Alyssa Borelli Leave a Comment

As time and technology moves on, so do the apps employees use. Check out these tips for auditing your tech stack.

Read More

Zero Trust, Leostream, AWS

What IT Admins Can Learn From Microsoft’s U.S. Government Zero Trust Strategy

August 18, 2021 Zachary Comeau Leave a Comment

Microsoft this week published a blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersecurity, and the company’s guidelines should be a framework for any organization to strive towards. The blog comes amid a heightened awareness of cybersecurity […]

Read More

Hackers use morse code to evade detection

Hackers Used Morse Code In This Phishing Attack

August 18, 2021 Alyssa Borelli Leave a Comment

Hackers’ are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

Read More

Cisco

Cisco Acquires Cloud Monitoring Startup Epsagon

August 17, 2021 Alyssa Borelli Leave a Comment

Cisco acquires cloud monitoring startup to better track the performance of the components that make up a firm’s digital infrastructure.

Read More

IoT Security

Report: Vulnerability Allows Hackers to Spy Via IoT Devices

August 17, 2021 Zachary Comeau Leave a Comment

A newly discovered vulnerability that could affect 83 million IoT devices allows an attacker to listen to live audio, watch real-time video data, compromise device credentials for further attacks or remotely control devices, according to new research. According to Mandiant, a subsidiary of cybersecurity firm FireEye, the IoT vulnerability is in the ThroughTek Kalay network, […]

Read More

John Oliver Takes Up Ransomware On “Last Week Tonight”

August 16, 2021 Zachary Comeau Leave a Comment

System administrators, IT professionals and cybersecurity experts have been sounding the alarm over ransomware and the increasing frequency of attacks over the last few months, and their message is now beginning to be picked up by mainstream media. Ransomware is now rising to a national security level thanks to recent attacks against Colonial Pipeline, JBS […]

Read More

Microsoft warns of macros-based malware

How To Protect Against Macro-Based Malware

August 13, 2021 Alyssa Borelli Leave a Comment

Macro-based malware, an attack that once fell out of favor with hackers is possibly resurging, according to experts.

Read More

Elon Musk Cryptocurrency bitcoin scam

Top 3 Ransomware Operators by Income

August 13, 2021 Alyssa Borelli Leave a Comment

A new ransomware payment tracking site aims to make financial transactions to ransomware operators more transparent, see who’s on top.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 151
  • Page 152
  • Page 153
  • Page 154
  • Page 155
  • Interim pages omitted …
  • Page 296
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.