• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

IT Considerations M&A, Proofpoint, Illusive

Navigating the IT Considerations of M&A

The IT department and technology leaders play a critical role when acquiring or merging with another organization, CIOs say.

February 14, 2022 Zachary Comeau Leave a Comment

In today’s digital age, when technology drives innovation and serves as a foundational piece of any organization, the IT department is a critical consideration when conducting a merger or an acquisition. Integrating the technology used by each organization is an incredibly important and time-consuming task that requires diligence and deliberate decision-making to ensure that the […]

Read More

CISA Software Security

This CISA Resource Can Help Protect You From Actively Exploited Bugs

CISA has added 15 new actively exploited bugs to its catalog of known exploited vulnerabilities that all organizations should patch.

February 14, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been extremely active in helping both the public sector and private sector respond to cybersecurity threats, and is often one of the leading voices when new threats emerge. The agency, part of DHS, has released guides, advisories and other resources on current and historical threats, and […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

Surfshark Releases Data Vulnerability Thermometer

VPN provider Surfshark has released a data vulnerability thermometer designed to inform users of their personal risk.

February 11, 2022 Zachary Comeau Leave a Comment

VPN provider Surfshark has released what it calls the world’s first data vulnerability thermometer designed to inform users of their personal risk scores in data breaches. According to Surfshark, the company’s Data Vulnerability Thermometer combines open-sourced FBI information and research algorithms to give users their personal risk score, possible specific cybercrimes and prevention tactics on […]

Read More

employee data access

More Than A Third Of Former Employees Still Have Access To Company Data

Beyond Identity research finds former employees still have access to company data, such as email, social media accounts, and the back end of the company website.

February 10, 2022 Alyssa Borelli Leave a Comment

Leaving a job isn’t as simple as returning company issued equipment and key cards anymore. More than a third of former employees still have access to their company data, according to latest research from Beyond Identity, a passwordless authentication platform provider. Beyond Identity surveyed 1,121 employees and employers across Ireland, the U.K. and the U.S. […]

Read More

NSA Programming Languages

Most Organizations Lack Visibility Into Their Insider Risk

Cloud technologies, remote work, the Great Resignation and a corporate disconnect are leading to increased insider risk, Code42 report finds.

February 10, 2022 Zachary Comeau Leave a Comment

The continued adoption of cloud technologies and a lack of visibility into them, the Great Resignation and employees taking IP and sensitive data with them, and a disconnect between executives and IT workers are leading to increased insider risk, according Code42. The insider risk management software firm’s Annual Data Exposure Report for 2022 finds that […]

Read More

Elastic Announces the General Availability of Elastic 8.0

February 10, 2022 TechDecisions Staff Leave a Comment

Expanding Search Relevance with Native Vector Search, Simplified Data Onboarding, and Streamlined Security Ushering in a New Era of Speed, Scale, Relevance, and Simplicity for Customers Delivering native support for natural language processing (NLP) models and vector search with approximate nearest neighbor (ANN) capabilities Protecting customer data from unauthorized access with a new, simplified security […]

Read More

ZeroFox Releases 2022 Forecast Report Anticipating Increases in Ransomware, Third-Party Compromises and Malware-as-a-Service

February 10, 2022 TechDecisions Staff Leave a Comment

New report details expected threat activity trends and recommendations for security teams to address external threats WASHINGTON–(BUSINESS WIRE)–ZeroFox, a leading external cybersecurity provider, today published the “2022 Threat Intelligence Forecast,” detailing expected cybercriminal behavior trends including ransomware, malware-as-a-service, vulnerabilities and exploits. Within the report, the ZeroFox Intelligence team reviews 12 months of threat actor activity […]

Read More

IronNet Announces Agreement with a Gulf Cooperation Council Country to Provide Collective Defense for Critical National Infrastructure

February 9, 2022 TechDecisions Staff Leave a Comment

IronNet’s largest international Amazon Web Services deployment will enable real-time collaboration between public and private properties MCLEAN, Va.–(BUSINESS WIRE)–$IRNT–IronNet, Inc. (NYSE: IRNT) (“IronNet”), an innovative leader Transforming Cybersecurity Through Collective Defense℠, today announced the execution of a multi-year contract with a Gulf Cooperation Council (GCC) country —which is remaining anonymous to help protect its operational […]

Read More

Western Digital Comments on Production Status of its Joint Venture Flash Memory Manufacturing Facilities

February 9, 2022 TechDecisions Staff Leave a Comment

SAN JOSE, Calif.–(BUSINESS WIRE)–Western Digital Corp. (Nasdaq: WDC) today announced that contamination of certain material used in its manufacturing processes has occurred and is affecting production operations at both its Yokkaichi and Kitakami joint venture, flash fabrication facilities. Western Digital’s current assessment of the impact is a reduction of its flash availability of at least […]

Read More

Three Technologies Critical to an IT Pro’s Success in 2022 and Beyond

The modern IT professional needs to learn these three critical technologies to help organizations make best use of their technology.

February 9, 2022 [email protected] Leave a Comment

The modern IT professional needs to learn these three critical technologies to help organizations make best use of their technology.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 113
  • Page 114
  • Page 115
  • Page 116
  • Page 117
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.