• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: supply chain attack

This Week in IT, IT News

This Week in IT: Zoom Email, Red Hat’s WFH Strategy, Software Updates, Supply Chain Security

Zoom's email plans, Red Hat's workplace policies, Microsoft 365 app updates, supply chain security and iOS16 highlight this week's IT news.

September 15, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. Zoom is reportedly preparing email and […]

Read More

IT news, This Week in IT

This Week in IT: macOS Bug, New Google Cloud Offerings, Phishing Attacks, Autopatch, and More

Security research, threat trends and the general availability of Microsoft's AutoPatch highlight this week's IT news.

July 14, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Discovers macOS App Sandbox escape bug Microsoft says it […]

Read More

Codenotary First to Offer Integrated Solution for Compliance for Integrity of Supply Chain Software

June 15, 2022 TechDecisions Staff Leave a Comment

Condenotary Cloud provides zero-trust with immutable data storage in one integrated package; enables organizations to conform with supply-chain levels for software artifacts (SLSA) HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today announced that the company’s flagship product, Codenotary Cloud, is now the first all-in-one offering that allows organizations to attain compliance with the industry-standard […]

Read More

MITRE’s New “System of Trust” Protects Vulnerable Supply Chains

June 6, 2022 TechDecisions Staff Leave a Comment

SAN FRANCISCO–(BUSINESS WIRE)–Tomorrow at the RSA 2022 Conference, MITRE will unveil its new “System of Trust,” a framework to provide a comprehensive, community-driven, knowledge base of supply chain security risks and a customizable, security-risk assessment process for use by any organization within the supply chain ecosystem. For the first time, there’s a free and open […]

Read More

Kasada Fortifies Anti-Bot Platform to Disrupt “Solver Service” Supply Chain, Defending Organizations Against the Latest and Stealthiest Automated Threats

June 3, 2022 TechDecisions Staff Leave a Comment

Makes Development and Upkeep of New Solver Services Used to Bypass Bot Detections Time- Consuming and Expensive NEW YORK–(BUSINESS WIRE)–#CAPTCHA—Kasada, provider of the most effective and easiest way to defend against advanced bot attacks, today announced platform advancements to address the growing prevalence of automated attacks, including “Solver Services,” which are API-as-a-service tools created to […]

Read More

HackerOne OpenASM

HackerOne Launches New Initiative to Extend Value of Attack Surface Management Tools

HackerOne's OpenASM is designed to combine scan data from multiple vendors so customers can strengthen pentesting and bounty efforts.

June 2, 2022 Zachary Comeau Leave a Comment

Attack resistance management provider HackerOne is launching a new initiative, OpenASM, designed to combine scan data from multiple vendors so customers can strengthen penetration testing and bounty efforts. According to the company, this can also help ethical hackers enrich, risk rank and prioritize assets. HackerOne Assets, a new attack resistance management (ASM) product, is the […]

Read More

Codenotary Adds Vulnerability Scanning to Popular Community Platform for Open Source Supply Chain Security

May 11, 2022 TechDecisions Staff Leave a Comment

Community Attestation Service addresses need for integrated, continuous security for developers HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today announced the addition of the first-ever free background vulnerability scanning service combined with a free and open source Community Attestation Service (CAS) code signing and attestation service to further secure open source supply chains. Gartner […]

Read More

Lattice to Host Virtual Seminar on Cyber Resiliency for Firmware Protections and Supply Chain Security

May 10, 2022 TechDecisions Staff Leave a Comment

HILLSBORO, Ore.–(BUSINESS WIRE)–$LSCC #AMI—Lattice Semiconductor (NASDAQ: LSCC), the low power programmable leader, today announced the company will host its virtual security seminar about the challenges, opportunities, and latest programmable logic solutions when designing products that are cyber resilient at the firmware level. During the seminar, security experts from Lattice and AMI will explore the cyberattack […]

Read More

Binarly Partners With immune to Secure Hardware, Firmware and Software Supply Chain

May 3, 2022 TechDecisions Staff Leave a Comment

With firmware attacks becoming more and more complex, partnership creates a unique, next-generation solution capable of detecting known and unknown threats in multiple firmware components across devices. PASADENA, Calif.–(BUSINESS WIRE)–#firmware–Binarly Inc. and immune, GmbH have entered into a strategic partnership to deliver the most comprehensive device security solution to protect customers against hardware, firmware and […]

Read More

AttackIQ Announces Integration with Vectra AI Threat Detection and Response Platform to Help Customers Optimize their Security Control Effectiveness

April 20, 2022 TechDecisions Staff Leave a Comment

Enables mutual customers to continuously measure the efficacy of their security investments SANTA CLARA, Calif.–(BUSINESS WIRE)–AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced a new integration with Vectra®, an AI-driven threat detection and response platform that enables joint customers to detect attacks that have bypassed existing security controls and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 17
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.