• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: Linux

Screenshot of Magewell Cloud software program

Magewell Releases Cloud Management Software

The Magewell Cloud software offers convenient configuration and control of multiple Magewell hardware devices.

March 11, 2022 TD Staff Leave a Comment

Magewell announced the general availability of its Magewell Cloud multi-device management software. The new software is flexibly deployable on an on-premises server or cloud hosting platform. It also provides centralized configuration and control of multiple Magewell streaming and IP conversion solutions. Two additional, premium Magewell Cloud versions also offer streaming management features. These include SRT […]

Read More

1Password Browser Extension

The Most Common Passwords Used In Brute Force & Spraying Attacks

Despite an increased focus on identity and password security, common passwords continue to be vulnerable to attack, Specops report finds.

March 9, 2022 Zachary Comeau Leave a Comment

Despite an increased focus on identity, multifactor authentication and password security, passwords continue to be vulnerable to attack, according to a new report from password security provider Specops Software. According to the study, The 2022 Weak Password Report, 93% of password attacks use passwords with at least eight characters, suggesting that attackers are aware of […]

Read More

CISA Software Security

CISA Adds 95 New Bugs To Database Of Known Exploited Vulnerabilities

Some security bugs recently added to CISA's catalog of known exploited vulnerabilities are more than a decade old.

March 4, 2022 Zachary Comeau Leave a Comment

There are 95 new known exploited vulnerabilities that IT and security professionals should immediately investigate and mitigate, including several that date back at least a decade, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The agency added the vulnerabilities to its catalog of known exploited vulnerabilities based on evidence of exploitation in the […]

Read More

Extron Phoenix College

Extron Elevates IT Learning Experience At Phoenix College

Phoenix College outfitted its Maricopa IT Institute with over 150 Extron switching and control devices for an enhanced learning experience.

February 28, 2022 TD Staff Leave a Comment

Phoenix College, located in Maricopa County, has 17,000 students enrolled in over 150 associate degree and certificate programs. The college says it emphasizes workforce development and promotes a symbiotic relationship with industries in the Phoenix metropolitan area and surrounding Maricopa County. In September 2020, the Maricopa IT Institute (ITI) opened to further that mission. The […]

Read More

Sumsub facial biometric check software

iOS/Mac Users Pass Facial BioMetrics Checks Faster

Sumsub's global study of facial biometric reveals differences across countries, devices and common failures and manipulation attempts.

February 24, 2022 TD Staff Leave a Comment

Facial biometric checks, also know as “face authentication,” are meant to protect businesses from fraud by ensuring that users are truly present during remote verification. Sumsub, an online verification identity service that helps onboard millions of users annually, examined the efficiency of face authentication and found differences in the time needed to complete facial biometric […]

Read More

Sysdig Security and Visibility Solutions Available for Oracle Cloud

February 22, 2022 TechDecisions Staff Leave a Comment

Now available in the Oracle Cloud Marketplace, the Sysdig platform gives Oracle Container Engine for Kubernetes users a unified view of the risk, compliance, and performance of cloud-native applications SAN FRANCISCO–(BUSINESS WIRE)–Sysdig, the unified container and cloud security leader, announced today that the Sysdig platform has been extended to support Oracle Cloud Infrastructure (OCI). With […]

Read More

CoSoSys Launches Advanced Content Detection and Integrations With the Release of Endpoint Protector 5.5.0.0

February 11, 2022 TechDecisions Staff Leave a Comment

RALEIGH, N.C.–(BUSINESS WIRE)–CoSoSys, a leader in Data Loss Prevention (DLP) and insider threat management, has announced the latest version of its award-winning Endpoint Protector solution. Endpoint Protector v5.5.0.0 introduces a host of new features, including Advanced Content Detection, allowing organizations to build even more targeted data protection policies, reduce false positives, and tackle the growing […]

Read More

SBOMs, Microsoft, Salus

SBOMs Will Become A Necessity In IT Ecosystem

New research suggests that a software bill of materials (SBOM) will become a critical piece of software supply chain security.

February 4, 2022 Zachary Comeau Leave a Comment

IT professionals and software developers should prepare for Software Bills of Materials (SBOMs) to become a regular part of the IT ecosystem, according to new research from the Linux Foundation. The term, while already known to IT professionals, became more popular in the wake of several software supply chain security crises, including the SolarWinds compromise, […]

Read More

MIcrosoft Okta Lapsus$

Patch Now: RCE Vulnerability Found in Samba

Administrators are advised to immediately deploy the fix and be on the lookout for vendors that will need to release their own patches.

February 2, 2022 Zachary Comeau Leave a Comment

Researchers have discovered an Out-of-Bounds Heap Read/Write vulnerability in Samba that could allow unauthenticated remote attackers to execute arbitrary code on affected installations of the free software. The bug, tracked as CVE-2021-44142, was initially discovered at the Pwn2Own event in Austin, and researchers with Trend Micro’s Zero Day Initiative discovered additional variants of the bug […]

Read More

Software Supply Chain Security Specialist Codenotary Raises $12.5 Million in Series B Round

January 20, 2022 TechDecisions Staff Leave a Comment

Founder of Xen and KVM hypervisors turns his sights to security during year highlighting critical vulnerabilities in software delivery HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, the immutability specialist that can instantly identify untrusted components in software, today announced that it has raised $12.5 million in series B funding by new and existing investors Bluwat, Elaia and others. The financing […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Interim pages omitted …
  • Page 24
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.