• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cisa

NSA Network Security

NSA: This Is How Admins Should Do Network Security

The National Security Agency has released a detailed guide to help administrators better secure their network.

March 7, 2022 Zachary Comeau Leave a Comment

With cybersecurity now the top concern for IT leaders and their team, dozens of organizations, including private companies, nonprofits, IT providers and cybersecurity vendors have released cyber-hardening guides over the last few years to help organizations secure their infrastructure. The U.S. Cybersecurity and Infrastructure Agency, in particular, has been a leading voice when it comes […]

Read More

Google Cybersecurity Certificate

Senate-Passed Cybersecurity Bill Requires Incident Reporting Within 72 Hours

The U.S. Senate has passed a bipartisan bill designed to harden U.S. cybersecurity in both public and private sector.

March 2, 2022 Zachary Comeau Leave a Comment

The Senate has passed a bipartisan bill designed to harden U.S. cybersecurity in both public and private sectors requiring organizations to report significant cyberattacks and ransomware payments to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The proposed bill, Strengthening American Cybersecurity Act, combines language from three bills that Sens. Rob Portman (R-OH), Gary Peters […]

Read More

3CX Hack Supply Chain attack compromise

These Destructive Malware Strains Have Targeted Organizations in Ukraine

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine.

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Cyber Attack Trends Amid Russia-Ukraine Conflict

Cyber attacks against Ukraine has surged along with phishing emails and destructive malware amid the Russia/Ukraine conflict.

February 28, 2022 TD Staff Leave a Comment

Cyber attacks on Ukraine’s government and military sector surged by 196% within the first three days of Russia’s invasion on Feb. 24, 2022, compared to the start of the month, according to Check Point Research. The cybersecurity firm released its findings from the first few days of the conflict, finding that attacks against Ukraine far […]

Read More

Malware file types, HP Wolf security

Research Discover Highly Advanced Espionage Malware Linked To China-based Hackers

The Symantec Threat Hunter Team has discovered a highly sophisticated spying malware used by China-based threat actors.

February 28, 2022 Zachary Comeau Leave a Comment

Symantec, a subsidiary of Broadcom and a member of the U.S. Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative, has uncovered a new malware strain the company calls the most advanced piece of malware ever linked to China-based threat actors. The Symantec Threat Hunter team says it uncovered malware that appears to be used […]

Read More

Russia Cyberattack

10 Things IT Can Do To Harden Cyber Defenses Amid The Russia-Ukraine Conflict

With cyberattacks stemming from the Ukraine crisis possibly spilling over into the West, here are 10 cybersecurity steps IT can take now.

February 25, 2022 Zachary Comeau Leave a Comment

Cyberattacks have been front and center in the Ukraine crisis, as the country is not just suffering from conventional warfare as it fights with Russia. The country’s critical infrastructure has been repeatedly attacked, purportedly by hackers working for their next door adversary. These attacks have targeted government websites, infrastructure and more with DDoS attacks and […]

Read More

Russia Ukraine Cyberattacks

Cybersecurity Experts: Ukraine, Russia Crisis Could Result in U.S. Cyberattacks

Cybersecurity experts are warning organizations to be extra vigilant against cyberattacks as the Russia-Ukraine crisis unfolds.

February 16, 2022 Zachary Comeau Leave a Comment

As the world waits to see what unfolds in Ukraine, cybersecurity professionals are urging western governments and organizations to be prepared for serious cyberattacks coming from Russia and its allies. These warnings come from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) as well as private sector cybersecurity software providers like Mandiant that have raised […]

Read More

ISACA Makes 2022 Conferences More Globally Accessible With Hybrid Format and New Pricing

February 7, 2022 TechDecisions Staff Leave a Comment

SCHAUMBURG, Ill.–(BUSINESS WIRE)–ISACA, a global association serving business technology professionals, announced its annual ISACA Conference series schedule for 2022, as well as additional training and learning opportunities focused on emerging technologies, innovation and best practices. To connect with more IT professionals across the globe, ISACA has lowered its pricing for the ISACA Conference series in […]

Read More

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

January 31, 2022 TechDecisions Staff Leave a Comment

Key Findings In Q3 2021, the financial sector was the most targeted seeing 22% of ransomware and 37% of APT detections Publicly reported cyber incidents in the financial sector increased 21% compared to Q2 2021 Nearly half of APT activity monitored appears to originate from Russian and Chinese backed groups Cobalt Strike attack suite abused […]

Read More

Active Directory Misconfigurations

Why Active Directory Attack Paths are the Secret to Many Successful Ransomware Attacks

By gaining control of an organization’s AD, the adversary seizes the power to deploy ransomware to all systems through several mechanisms.

January 19, 2022 Andy Robbins Leave a Comment

It’s no secret that most major enterprises across the globe use Microsoft Active Directory (AD) for identity and access management. This ubiquity is also one of the predominant reasons AD is such a popular and attractive target for adversaries. What remains a mystery to many enterprises, however, is how adversaries – including the malicious actors […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Interim pages omitted …
  • Page 15
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.