• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Cybersecurity Risk

Report: Iranian Hacking Group Exploiting VPN Vulnerabilities

Cybersecurity experts say a hacking group suspected to be an Iranian state-sponsored entity is selling access to compromised corporate networks.

September 3, 2020 Zachary Comeau Leave a Comment

Cybersecurity experts say a hacking group suspected to be an Iranian state-sponsored entity is selling access to compromised organization networks. The group, code named Pioneer Kitten, has been active since at least 2017 and is focused on gaining and maintaining access to entities possessing sensitive information of likely intelligence interest to the Iranian government,” cybersecurity […]

Read More

Microsoft Patch Tuesday

Microsoft Issues Fixes for 129 Vulnerabilities in Patch Tuesday Release

Microsoft has released fixes for 129 vulnerabilities in what was some are calling the largest patch Tuesday in the history of the Windows operating system.

June 10, 2020 Zachary Comeau Leave a Comment

Microsoft has released fixes for 129 vulnerabilities in what was some are calling the largest patch Tuesday in the history of the Windows operating system. However, none of the bugs addressed in this months’ updates are known to have been exploited or known prior to the release, but there are some that warrant special attention […]

Read More

2020 Global IoT/ICS Risk Report, control system vulnerabilities

‘Alarming’ Prevalence of IoT and Industrial Control System Vulnerabilities in Real-World Network Study

Control system vulnerabilities study explains why orgs are susceptible to downtime, safety incidents & theft of intellectual property.

October 25, 2019 TechDecisions Staff Leave a Comment

IoT and industrial control system vulnerabilities are “alarming” in their rampant state, says a report by CyberX called “2020 Global IoT/ICS Risk Report.” The data illustrates that IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property, the […]

Read More

Proofpoint CISO, CISOs cyberattack

Assess Your Cyber Risks and Vulnerabilities

Your organization may be vulnerable to cyber risks as a result of systems being installed on or adjacent to the network. Here are some considerations for assessing cyber risks.

February 27, 2019 Paul Konikowski Leave a Comment

Most of these vulns can be patched by updating the firmware, securing the network, and/or enabling the passwords on the devices. But uncovering and patching these device vulnerabilities is only one aspect of securing AV installations.

Read More

Fake Fingerprints Show Vulnerabilities in Security Measures

A group of researchers at NYU developed artificial fingerprints that were able to closely match real ones, demonstrating a possible weakness in fingerprint security methods.

December 5, 2018 Sam Harton Leave a Comment

A group of researchers at NYU developed artificial fingerprints that were able to closely match real ones, demonstrating a possible weakness in fingerprint security methods.

Read More

Cisco acquisitions

Why Cisco’s Recently Detected Vulnerabilities Are a Good Thing for Decision Makers

Even though Cisco found three vulnerabilities in its backend, the steps it took to find them is a good reminder that audits are important.

June 6, 2018 Jessica Messier Leave a Comment

Even though Cisco found three vulnerabilities in its backend, the steps it took to find them is a good reminder that audits are important.

Read More

Cyber Security

Researchers Hope This Bug-Mining Tool Will Combat Network Vulnerabilities

Red Balloon’s “n-days” tool aims to find network vulnerabilities and improve them before hackers attempt a digital break in.

February 7, 2018 Jessica Messier Leave a Comment

Red Balloon’s “n-days” tool aims to find network vulnerabilities and improve them before hackers attempt a digital break in.

Read More

2 Cyberthreat Vulnerabilities Colleges Need to Worry About This School Year

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

September 10, 2015 TD Staff Leave a Comment

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

Read More

Cloud, SASE, Aryaka

IT Leaders at Midsize Companies Are Rethinking Their Cloud Mix

Midsize companies are optimizing cloud strategies with hybrid and multi-cloud models to balance cost, security and efficiency.

July 20, 2025 Kamal Srinivasan Leave a Comment

With the initial launch of the public cloud around 20 years ago, the industry ushered in a new era of scalable, on-demand ‘as-a-service’ models. Fast forward to 2025, and the public cloud is far from retreating – it is now playing a central role in more complex, resilient IT strategies. But how companies are using […]

Read More

Cloud, SASE, Aryaka

How the Cloud is Redefining Media Production and Entertainment

Cloud computing drives efficiency, scalability and collaboration in media, transforming production with secure, scalable and cost-effective solutions.

April 9, 2025 Dominik Birgelen Leave a Comment

Cloud computing drives efficiency, scalability and collaboration in media, transforming production with secure, scalable and cost-effective solutions.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.