• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Blogs

Ransom payments

Ransom Payments Are Declining

July 29, 2021 Alyssa Borelli Leave a Comment

Coveware reports Q2 ransom payments amounts are declining as ransomware becomes a national security priority.

Read More

Zero Trust, Leostream, AWS

Microsoft: Zero Trust Is Now A Top IT Priority

July 29, 2021 Zachary Comeau Leave a Comment

As organizations look for new ways to deal with the growing threat of cyberattacks, Zero Trust is increasingly becoming mainstream among IT and cybersecurity professionals, according to a new report from Microsoft. The IT giant has released its Zero Trust Adoption Report 2021 in which more than 1,200 security decision-makers were surveyed about their Zero […]

Read More

Is the Great Resignation Increasing Cloud App Security Risks?

July 28, 2021 Alyssa Borelli Leave a Comment

Departing employees, ahead of their departure, pose an increase in cloud app security risk as they upload files to personal apps.

Read More

SolarWinds Virtual Agent AI

SolarWinds Report: IT Pros, Leaders Aligning More on Cyber Risk

July 28, 2021 Zachary Comeau Leave a Comment

Eight months after the Russia-led highly sophisticated hacking campaign leveraging the SolarWinds Orion platform, the company has released its annual IT Trends Report, this one highlighting how IT professionals perceive their organization’s cyber risk management and mitigation after a tumultuous year. The report touches on everything from external threats, internal threats, remote work policies and […]

Read More

Exploited Vulnerabilities

Patch These Heavily Exploited Vulnerabilities Now

July 28, 2021 Zachary Comeau Leave a Comment

When a vendor or security researcher discloses a vulnerability in an IT product, organizations should be quick to apply the patch or implement a secure workaround to protect networks from bad actors that are quick to exploit that vulnerability. When those vulnerabilities are in widely used products from popular vendors like Citrix, Pulse, Microsoft and […]

Read More

Tokyo Olympics

Five Not-So-Surprising Technologies Used At Tokyo Olympics

July 27, 2021 Alyssa Borelli Leave a Comment

Japan puts on a mini-show to the world what advanced technologies are yet to come at the 2020 Olympics in Tokyo.

Read More

Microsoft Security RSA Conference

Microsoft: How To Prevent NTLM Relay Attack

July 26, 2021 Zachary Comeau Leave a Comment

Microsoft has shared instructions on how to mitigate PetitPotam, an NT Lan Manager (NTLM) relay attack used against Windows domain controllers or servers. The company did not say if the vulnerability is currently being exploited. Microsoft called it a “classic” NTLM relay attack that allows an attacker to take over a domain controller or other […]

Read More

No More Ransom

Check This Resource Out Before Paying a Ransom Or Restoring Data

July 26, 2021 Zachary Comeau Leave a Comment

When your computer systems are infected with ransomware, you may think you only have two options: pay to (maybe) have all your data decrypted by the hackers or start the long and arduous process of restoring everything. Those two options have their pros and cons. Paying the ransom can be a quick fix, but it’s […]

Read More

Google Chat upgrade

What IT Admins Need To Know About The Google Chat Upgrade

July 26, 2021 Alyssa Borelli Leave a Comment

Google Chat will replace the classic Hangouts as the default chat application for users unless IT admins choose to delay.

Read More

SBOMs

The Top Three Most Dangerous Software Vulnerabilities

July 23, 2021 Alyssa Borelli Leave a Comment

Mitre released its annual list of the most dangerous software vulnerabilities for developers and users alike to be aware of and patch ASAP.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 154
  • Page 155
  • Page 156
  • Page 157
  • Page 158
  • Interim pages omitted …
  • Page 296
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.