• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH

Search Results: crowdstrike

Google Assistant

Google’s Zero Trust Security Platform BeyondCorp Enterprise Now Available

Google has announced the general availability of the company’s new zero trust product offering, BeyondCorp Enterprise, replacing BeyondCorp Remote Access.

January 27, 2021 Zachary Comeau Leave a Comment

Google’s cloud security team has announced the general availability of the company’s new zero trust product offering BeyondCorp Enterprise that extends and replaces BeyondCorp Remote Access. According to Google, this release is in response to global cybersecurity incidents that are forcing companies to rethink their security plans as attackers become more sophisticated and skillful. In […]

Read More

SolarWinds

SolarWinds CEO: Company Might Not Be the Only Compromise

SolarWinds CEO Sudhakar Ramakrishna lays out attack timeline and says this should be a wake up call for the tech industry to share attack information.

January 14, 2021 Zachary Comeau Leave a Comment

In a new blog, SolarWinds’ CEO laid out what it is doing to respond to the compromise of its Orion IT management platform and what it knows so far about the attack. As many cybersecurity and IT experts have been saying, SolarWinds’ CEO Sudhakar Ramakrishna called the attack – which the company codenames Sunburst – […]

Read More

Threat Detection Trends

SolarWinds Hackers Viewed Microsoft Source Code; Victim List Grows to 250

Microsoft found malicious SolarWinds applications in its environment that were removed - no evidence yet that attackers used their tools.

January 4, 2021 Zachary Comeau Leave a Comment

Details of the SolarWinds hack been unfolding for a few weeks now, and more recently, Microsoft has announced that the hackers have viewed the company’s internal source code. The company previously disclosed that it has found malicious SolarWinds applications in its environment that were isolated and removed, and there is no evidence to date that […]

Read More

Cybersecurity Remote Work

What IT Leaders Need To Do To Secure Their Remote Workforce

Remote work will continue for some time, as will the inherent cybersecurity issues that come with it. IT leaders need to act now and prepare for the future.

December 8, 2020 Zachary Comeau Leave a Comment

Millions of workers have been operating out of their homes since the spring, and many will continue to do so at least part time even after the COVID-19 pandemic is over and officials deem it safe to return to the office. However, that rapid dispersion of the workforce largely didn’t account for cybersecurity, and IT […]

Read More

Cybersecurity Workforce Report

Report: Cybersecurity Workforce Gap Narrows in Pandemic Year

Cybersecurity association (ISC)² in a new report says although the global cybersecurity workforce grew in 2020, it needs to grow 89% to fill the talent gap.

November 25, 2020 Zachary Comeau Leave a Comment

Cybersecurity membership association (ISC)² in a new report says the global cybersecurity workforce needs to grow 89% worldwide to fill the talent gap. That talent gap, according to the organization, is the top concern of IT professionals as the cybersecurity workforce gap actually began to close for the first time ever as the industry added […]

Read More

Cybersecurity Risk

Report: Iranian Hacking Group Exploiting VPN Vulnerabilities

Cybersecurity experts say a hacking group suspected to be an Iranian state-sponsored entity is selling access to compromised corporate networks.

September 3, 2020 Zachary Comeau Leave a Comment

Cybersecurity experts say a hacking group suspected to be an Iranian state-sponsored entity is selling access to compromised organization networks. The group, code named Pioneer Kitten, has been active since at least 2017 and is focused on gaining and maintaining access to entities possessing sensitive information of likely intelligence interest to the Iranian government,” cybersecurity […]

Read More

Microsoft Defender Antimalware engine

Kentucky University & UK Healthcare End Month-Long Malware Attack

Hackers from outside the United States compromised University of Kentucky computer networks to mine cryptocurrency in large malware attack.

March 20, 2020 TechDecisions Staff Leave a Comment

The largest university system in Kentucky recently rebooted its networks after dealing with a large-scale malware attack for a month. Officials say it was the worst in the school’s history. According to officials, the three-hour campus-wide network outage at the University of Kentucky (UK) and UK Healthcare was successful at “mitigating the existing cyber threat,” […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

Do you still trust the "Trust but Verify" model of cyber security? These companies don't, and neither should you, says a "Zero Trust Security" proponent.

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

More Ransomware Attacks Are Hitting Schools

Ransomware hackers are targeting schools with weak cybersecurity, threatening to release sensitive student information unless a ransom is paid.

December 4, 2017 TechDecisions Staff Leave a Comment

Ransomware hackers are targeting schools with weak cybersecurity, threatening to release sensitive student information unless a ransom is paid.

Read More

Cyber Security

How Does Fileless Ransomware Work?

Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.

June 7, 2017 Con Mallon Leave a Comment

Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.

Read More

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 4
  • Go to page 5
  • Go to page 6

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.