• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: LED

MIcrosoft Entra External ID

August 2022 Patch Tuesday: 121 Microsoft Vulnerabilities

The 121 vulnerabilities include an actively exploited MSDT code execution bug and 16 other critical-rated flaws.

August 9, 2022 Zachary Comeau Leave a Comment

IT admins will need to patch 121 critical vulnerabilities this month as part of Microsoft’s monthly security patches, which is notably higher than what is typically expected of an August security release. According to Zero Day Initiative (ZDI), the security bugs fixed this month affect Azure Batch Node Agent, Real Time Operating System, Site Recovery, […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Modern Cyber Threats, Supply Chain Attacks Are Burning Out IT Pros, Experts Say

The constantly shifting IT landscape is breeding more cyberattacks, leading to burnout. Applying psychology concepts to the industry may help.

August 9, 2022 Zachary Comeau Leave a Comment

The software supply chain and our increasing reliance on cloud infrastructure is making protecting IT environments more challenging and leading to cybersecurity burnout among IT  professionals, according to a panel of cybersecurity experts held last week in advance of Black Hat USA this week. Attackers are increasingly leveraging the software supply chain and open-source software […]

Read More

Microsoft Fortra healthcare ransomware

Ransomware Groups Continue to Disrupt Industrial Operational Technology

Dragos observed 125 ransomware incidents targeting industrial OT environments in Q2 compared to 158 in the last quarter.

August 9, 2022 TD Staff Leave a Comment

Ransomware groups continued to target industrial organizations and infrastructures and disrupt operational technology (OT) operations in the second quarter of 2022, according to industrial cybersecurity firm Dragos, Inc. In May of 2022, electronics manufacturer Foxconn was hit by Lockbit 2.0 ransomware, resulting in over 1,200 servers in one of the company’s factories in Mexico becoming […]

Read More

Microsoft 365 domain, cloud.microsoft

Microsoft Office to begin publishing Office symbols

Microsoft Office will begin publishing symbols for Windows via the Microsoft Public Symbol Server to help improve security and performance.

August 9, 2022 Zachary Comeau Leave a Comment

Microsoft Office will begin publishing symbols for Windows via the Microsoft Public Symbol Server to help improve security and performance for the company’s customers and partners. The Redmond, Wash. IT giant says the move will help empower the cybersecurity community to protect customers by providing additional information to security researchers to help them find and […]

Read More

Kean University Esports Arena

Designing a Premier Collegiate Esports Venue at Kean University

Kean University collaborates with IT, athletics and academics for a premier community esports arena.

August 8, 2022 TD Staff Leave a Comment

The Kean University Esports Arena is a premier collegiate esports venue featuring spaces for competition with spectator seating, broadcast, general gaming and consoles. The campus community, curriculum implementation and requirements of competition were all taken into consideration for the layout, equipment and overall theming of the project.  The competition space features a large LED wall […]

Read More

Vulnerability Dahua ONVIF

Vulnerability Discovered in Dahua’s ONVIF Implementation

The vulnerability could be abused by attackers to access Dahua cameras with full privileges, including watching live video footage.

August 5, 2022 TD Staff Leave a Comment

Cybersecurity firm Nozomi Networks recently revealed it had discovered a new vulnerability affecting the implementation of an Open Network Video Interface Forum (ONVIF) authentication mechanism in some IP cameras developed by Dahua Technology. According to a blog post by the cyber experts, this vulnerability could be abused by attackers to compromise Dahua network cameras by sniffing a […]

Read More

3CX Hack Supply Chain attack compromise

These are the Top 11 Malware Strains Observed in 2021

These are the top malware strains that IT and security professionals should protect against, according to U.S., Australian cybersecurity officials.

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

SolarWinds IT Pro Day

This Week in IT: Teams and Apple Silicon, Cloud Leaders, VMware and Cisco Patches

Better Teams performance on Macs, cloud infrastructure market data, critical patches and cyber threats highlight this week's IT news.

August 4, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Teams on Macs with Apple silicon Microsoft will be rolling out […]

Read More

router vulnerabilities security flaws

Router Security Flaws Surge to Record Heights

Router security flaws may expose individuals and corporate networks to cybersecurity dangers. Here's how to secure your home WiFI network.

August 4, 2022 TD Staff Leave a Comment

With the rise of remote work, routers are gaining more attention. Remote work opens the possibility for hackers to breach corporate security by abusing old and unpatched home routers, according to Atlas VPN. Router flaws may expose individuals and corporate networks to cybersecurity dangers such as hacking, data breaches, financial fraud, industrial espionage and others. […]

Read More

Software Vendor Trust

How to Vet a Vendor’s Transparency and Trustworthiness

With the rise of the cloud and SaaS, organizations should demand transparency of their tech vendors. Here's how to vet their trustworthiness.

August 4, 2022 Zachary Comeau Leave a Comment

Has your organization ever found out about a technology vendor’s security incident from news reports rather than a transparent disclosure to customers from the vendor itself? If so, and that vendor has not profusely apologized for not disclosing that incident, then it may be time to cut bait with that particular provider. That is especially […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 76
  • Page 77
  • Page 78
  • Page 79
  • Page 80
  • Interim pages omitted …
  • Page 849
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.