• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cisa

This Week in IT, IT News

This Week in IT: Sneaky Ransomware; Google, Army Partnership; Digital Transformation; Chinese Hackers

BlackByte's tactics, Google's Army Workspace deal, automation, digital transformation and China's favorite bugs highlight this week's IT news.

October 6, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. BlackByte ransomware group disables security products […]

Read More

This Week in IT, IT News

This Week in IT: DevSecOps, OT Security, SMB Tech Spending, Gartner’s IT Conference

DecSecOps research, a new advisory on OT cybersecurity, SMB tech spending trends and Gartner's IT Symposium highlight this week's IT news.

September 22, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. The difficulties of vulnerability management in […]

Read More

Guide to creating a ransomware response plan download

Blueprint Series: Creating a Ransomware Response Plan

Get our guide for creating a ransomware response plan filled with best practices, ways to prevent, protect and respond to a cyber attack.

September 22, 2022 Alyssa Borelli Leave a Comment

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and are assessing how they can overcome your organization’s defenses. Ransomware criminals will first consider your company’s ability to pay. They will often run financial analyses (just like a Wall Street analyst), research your […]

Read More

VMware EXSi security

U.S. Agencies Warn of Ransomware Attacks on K-12 Education Sector

K-12 institutions should take action now to protect against an increase in ransomware as the school year begins, U.S. agencies say.

September 7, 2022 Zachary Comeau Leave a Comment

U.S. agencies are warning of an increase in ransomware attacks against the K-12 education sector, singling out a relatively new threat actor that has been observed disproportionately targeting school systems as they welcome students back into their buildings. That threat actor is Vice Society—an intrusion, exfiltration and extortion hacking group that first appeared in summer […]

Read More

Microsoft Apple macOS bug

Patch Now: Apple Releases Fixes for Two Actively Exploited Zero-Day Bugs

Apple has discovered two actively exploited zero-day vulnerabilities that could give attackers full access to a wide range of Apple devices.

August 19, 2022 Zachary Comeau Leave a Comment

Apple has discovered two actively exploited zero-day vulnerabilities that could give attackers full access to a wide range of Apple devices, prompting the company to release security updates and urging users to apply the fixes immediately. According to Apple, the two zero-day out-of-bounds write bugs affect iPhone 6s and later, all iPad Pro models, iPad […]

Read More

This Week in IT, IT News, Microsoft, Google, Dell

This Week in IT: Google Meet, Cisco Attack, Ransomware, IT Spending

Google Meet updates, a sophisticated phishing attack against Cisco, IT spending and other cybersecurity items highlight this week's IT news.

August 11, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. New Google Meet live-sharing features As […]

Read More

3CX Hack Supply Chain attack compromise

These are the Top 11 Malware Strains Observed in 2021

These are the top malware strains that IT and security professionals should protect against, according to U.S., Australian cybersecurity officials.

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Log4Shell Will Remain an Issue For a Decade

The Log4Shell bug will remain an issue for IT and security teams for possibly a decade or longer, says new Cyber Safety Review Board report.

July 25, 2022 Zachary Comeau Leave a Comment

The critical vulnerability discovered late last year in the popular Java logger Log4j will be impacting IT environments for years due to the difficulty in finding and remediating vulnerable instances of the tool, according to a new report from the U.S. Department of Homeland Security’s Cyber Safety Review Board. The board—established in the wake of […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

Cybersecurity agencies say organizations should take several steps to secure PowerShell and keep it from being used in cyberattacks.

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

Beyond Identity

Research: Only 28% of SMBs Require MFA

Small and medium-sized businesses lack the awareness and resources to implement multi-factor authentication, Cyber Readiness Institute says.

July 6, 2022 Zachary Comeau Leave a Comment

The majority of small and medium-sized businesses (SMBs) are not leveraging multi-factor authentication (MFA) and are relying only on usernames and passwords to secure their data, according to a new study from the Cyber Readiness Institute. According to the organization’s Global Small Business Multi-Factor Authentication Study of 1,403 small and medium-sized businesses across eight countries, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Interim pages omitted …
  • Page 15
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.