• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: supply chain attack

ZeroNorth, rapid application security

ZeroNorth Launches Rapid Application Security Solution

Open source vulnerability scanning tools delivered via the ZeroNorth platform enable organizations to rapidly launch and mature AppSec programs.

December 19, 2019 TechDecisions Staff Leave a Comment

ZeroNorth, the a provider of risk-based vulnerability orchestration for apps and infrastructure, announces a new solution for Rapid Application Security, enabling customers to quickly stand up software security initiatives with open source vulnerability discovery tools. The company says their solution is ideal for companies seeking to rapidly deploy new application scanning capabilities, while evaluating long-term […]

Read More

industrial machine learning, Cogniac Cisco

What are Industrial Machine Learning Systems and How Are They Changing Industries?

Industrial machine learning transforms an industrial operation into a system of systems that can get products to market faster at a lower cost.

October 22, 2019 Joe Zulick Leave a Comment

The question that seems to get asked more often than not is to talk about how many industrial applications we can name for machine learning. Well, frankly that’s the wrong question. Industrial machine learning is not a device you can plug into a production line and make the production line operate better than it did […]

Read More

machine learning applications

Machine Learning Applications IT Pros Should Care About

AI is of growing importance to as many industries as you can rattle off at this moment. Here are some important machine learning applications.

September 24, 2019 Joe Zulick Leave a Comment

Machine learning applications came out of the field of artificial intelligence (AI). It is the process of computers having the ability to learn from experience. For instance, the software is coded with a generic algorithm that it can build upon. As technology continues to evolve, machines can now learn from input. We need machine learning […]

Read More

unchecked admin accounts, best practices

The Hidden Dangers of Unchecked Admin Accounts

Unchecked admin accounts are a danger to your organization's business: by not monitoring admins, you're leaving a door wide open to data threats.

August 29, 2019 Mitesh Patel Leave a Comment

So long as a user account is live and operative within your IT infrastructure, it is a potential gateway into your organization and makes it as easy as leaving a back window open into any device or application on your network being used via that account. Not having a clear record of all unchecked admin […]

Read More

OT Cybersecurity, network security

Frost and Sullivan Report Delves into the Mainstreaming of Industrial Internet of Things

Study finds with end-to-end digitalization and emerging industrial Internet of things, manufacturers are transitioning from product-centric to value-centric services.

February 1, 2019 Lisa Montgomery Leave a Comment

Study finds with end-to-end digitalization and emerging industrial Internet of things, manufacturers are transitioning from product-centric to value-centric services.

Read More

Proofpoint CISO, CISOs cyberattack

New Ways We Might Get Hacked in 2019

Relying on AI, old and new methods, hackers will be kicking up their attack strategies this year.

January 23, 2019 Jessica Messier Leave a Comment

Relying on AI, old and new methods, hackers will be kicking up their attack strategies this year.

Read More

government cyberattacks Google Microsoft

Three Easy Ways To Enhance Your Business’s Cybersecurity Posture

With cyberattacks on the rise, it’s never been more important to have a strong cybersecurity posture. It’s easier than you’d think to get started in that regard.

August 30, 2018 Max Emelianov Leave a Comment

With cyberattacks on the rise, it’s never been more important to have a strong cybersecurity posture. It’s easier than you’d think to get started in that regard.

Read More

who got hacked

When Decision Makers Give Loving Data a Bad Name, and How To Fix It

When an affinity for data gets in the way of keeping data safe, decision makers dampen the progress IoT can offer. Here are two ways they can change that.

July 16, 2018 Jessica Messier Leave a Comment

When an affinity for data gets in the way of keeping data safe, decision makers dampen the progress IoT can offer. Here are two ways they can change that.

Read More

How to Protect Your Organization Against DDoS and the Botnet Army

Here is the enterprise manager’s checklist to getting ready to protect the organization against DDoS attacks and the Botnet Army

May 2, 2017 Heitor Faroni Leave a Comment

Here is the enterprise manager’s checklist to getting ready to protect the organization against DDoS attacks and the Botnet Army

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 15
  • Page 16
  • Page 17

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.