• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: Microsoft

Nucleus Research Releases 2022 iPaaS Technology Value Matrix

May 3, 2022 TechDecisions Staff Leave a Comment

Boomi, IBM, Informatica, TIBCO, Tray.io, and Workato lead the market in delivering outstanding value through integration platform as a service. MIAMI–(BUSINESS WIRE)–#ROI–Nucleus Research found the Integration Platform-as-a-Service (iPaaS) market experienced significant growth during the past 12 months as organizations look to maximize the ROI from their operational data. “Nucleus found that enterprises with sizable IT […]

Read More

Crestron George Feldstein Technology Center with blue and white balloons decorating the front door. There is also a podium in front of the building where a person is holding a mic.

Crestron Dedicates Technology Center to Founder George Feldstein

Named after Crestron’s founder, the George Feldstein Technology Center will house the company's technological innovators and engineers.

May 3, 2022 TD Staff Leave a Comment

Crestron, based in Rockleigh, N.J., unveiled the George Feldstein Technology Center during the last week of April with speeches from president and CEO, Dan Feldstein, and COO, Dan Brady. The building located at 22 Link Drive has been renamed to honor George Feldstein. Feldstein founded Crestron over 50 years ago and paved the way for […]

Read More

IoT Security

This Hacking Group Uses Unsecure IP Camera Systems to Hide From IT

Mandiant says it is tracking a new threat actor that leverages unsecure videoconferencing cameras to hide in victim environments.

May 3, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Mandiant has published a detailed analysis of a new threat actor that has been observed remaining undetected in victim environments for at 18 months by installing backdoors on IP cameras appliances that do not support security tools and leveraging a large IoT botnet to spy on organizations involved in large corporate transactions. According […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks.

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

Shure MXA920

Shure Launches New MXA920 Ceiling Array Microphone

Shure's newMXA920 Ceiling Array Microphone features advanced audio capturing technology and easy deployment and management.

May 2, 2022 Zachary Comeau Leave a Comment

Audio solutions provider Shure is launching a new addition to its lineup of conferencing array microphones with its new MXA920 Ceiling Array Microphone, featuring advanced audio capturing technologies and easy deployment and management. The in-ceiling networked array microphones feature pre-configured audio capture, next generation array architecture for enhanced directional pick-up and more natural speech and […]

Read More

Hybrid Work security

The Great Resignation and Hybrid Work are Changing the Security Landscape

Supporting a remote/hybrid work environment complicates IT environments— Here are a few tips for employers to remain hypervigilant in their security practices.

April 29, 2022 Jimmy Chang Leave a Comment

Record numbers of Americans are quitting their jobs in what many are now calling the “Great Resignation.” Remaining employees who have had an opportunity to prove their value and ability to work productively from anywhere are placing intense pressure on their employers to support a remote/hybrid work environment. Gartner recently stated that “51% of global knowledge workers will be […]

Read More

Cubic Executes Operations Service Contract for Leap System in Ireland

April 29, 2022 TechDecisions Staff Leave a Comment

Cubic Transportation Systems expands European footprint with contract to enhance the National Transport Authority’s Leap offering SAN DIEGO–(BUSINESS WIRE)–Cubic Corporation today announced its Cubic Transportation Systems (CTS) business division will execute a contract by Ireland’s National Transport Authority (NTA) to be the operations service provider for the transport authority’s TFI Leap Card system. Cubic will […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Make Sure These 15 Most Exploited Vulnerabilities From 2021 Are Patched

IT pros should be familiar with some of these 15 most exploited 2021 bugs, but continued targeting of them suggests more organizations need to patch.

April 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with a coalition of U.S. and foreign security and law enforcement agencies, have released a list of the 15 most exploited vulnerabilities from 2021, calling on both public and private organizations to ensure these critical security bugs are mitigated and systems patched. The list, published in a […]

Read More

3CX Supply Chain Attack

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

With Microsoft taking action preventing the malicious use of Office macros, the Emotet operators are turning to OneDrive URLs and PowerShell.

April 27, 2022 Zachary Comeau Leave a Comment

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell. The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting […]

Read More

Trellix Finds Escalation of Cyberattacks Targeting Critical Infrastructure as Geopolitical Tensions Rise

April 27, 2022 TechDecisions Staff Leave a Comment

New Report Details Wiper Malware Aimed at Ukraine and Upsurge in Cyber Threats from Likely Russian-backed Actor in the Fourth Quarter of 2021 News Highlights Advanced persistent threat (APT) actors most often targeted the transportation and shipping sectors in Q4 2021. APT29, believed to conduct operations for Russian government entities, ranked most active among nation-state […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 89
  • Page 90
  • Page 91
  • Page 92
  • Page 93
  • Interim pages omitted …
  • Page 193
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.