• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

DDoS, NETSCOUT Arbor Insight

DDoS Attacks Combined With Extortion Attempts Exploded in Q4

According to new data from Cloudflare, the amount of DDoS attacks being layered with a ransom demand increased by 175% in the fourth quarter.

January 12, 2022 Zachary Comeau Leave a Comment

According to new data from web infrastructure and security firm Cloudflare, the amount of DDoS attacks being layered with a ransom demand are increasing significantly. The company’s DDoS Attack Trends report for the fourth quarter of 2021 revealed a ransom DDoS attack increase of 29% for the year and a whopping 175% for the quarter. […]

Read More

ERI’s John Shegerian Calls for 2022 to be ‘the Year Tech Recycling Goes Mainstream’ in Newsweek Op-Ed

January 12, 2022 TechDecisions Staff Leave a Comment

NEW YORK–(BUSINESS WIRE)–#ERI–In a new opinion-editorial published by Newsweek, John Shegerian, Chairman/CEO of ERI, the nation’s largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company, calls for 2022 to be “the year that technology recycling goes mainstream.” In the opinion editorial, Shegerian points out that despite e-waste still being the […]

Read More

10 Memes That Speak To The Struggles of Working in IT In 2022

We collected the 10 best memes that illustrate how difficult it is to work in IT right now. And no, they aren't all about Log4j.

January 12, 2022 Zachary Comeau Leave a Comment

Most of the time, we at My TechDecisions are hard at work bringing you tech professionals news and insights that can help you do your job managing the technology at your organization. However, we also recognize that working in IT can be stressful—especially over the last two years with the migration to remote work and […]

Read More

Options Expands Ultra-Low Latency Hosting Capabilities Across HKEX Equities and Derivatives Markets

January 12, 2022 TechDecisions Staff Leave a Comment

NEW YORK & LONDON & HONG KONG–(BUSINESS WIRE)–Options, the leading provider of managed trading infrastructure and connectivity to the global Capital Markets, has today announced the expansion of hosting capabilities in the Hong Kong Exchange for access to both the Equities and Derivatives markets. HKEX is one of the world’s major exchange groups, operating across […]

Read More

Keeper Security Launches Keeper Secrets Manager, the First Zero-Trust, Zero-Knowledge and Cloud-Native Solution for Securing Infrastructure Secrets

January 12, 2022 TechDecisions Staff Leave a Comment

Keeper Secrets Manager is the first and only zero-trust, zero-knowledge and cloud native secrets manager that integrates into virtually any tech stack, with no on-premise installations required CHICAGO–(BUSINESS WIRE)–Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software covering password management, dark web monitoring, digital file storage and messaging, announces the launch of Keeper […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

A Chinese Ransomware Operator Is Leveraging Log4j Bugs, VMWare Horizon

Ransomware operation leveraging Log4j bugs began attacking internet-facing systems running VMWare Horizon earlier this month, Microsoft says.

January 11, 2022 Zachary Comeau Leave a Comment

The IT and cybersecurity community sounded the alarm last month when researchers discovered vulnerabilities in Log4j, the ubiquitous java logger used by a wide range of tech products. The tool has been patched and vendors are quickly deploying its own patches for products that use the tool, but the situation is not getting much better […]

Read More

Yugabyte Named CVE Numbering Authority

January 11, 2022 TechDecisions Staff Leave a Comment

As a CVE Numbering Authority, Yugabyte Joins a Community of Security Experts to Publish Newly Discovered Vulnerabilities SUNNYVALE, Calif.–(BUSINESS WIRE)–Yugabyte, the leader in open source distributed SQL databases, today announced it has been designated as a CVE Numbering Authority (CNA) by the CVE Program. Yugabyte joins an elite group of public and private sector organizations […]

Read More

Log4J SBOM

Log4j Highlights the Need for a Software Bill of Materials; Here’s How to Create One

Amid the Log4j vulnerabilities, it’s more important than ever that companies prioritize dependency management by creating a SBOM.

January 11, 2022 Bren Briggs, VP of DevOps and Cybersecurity at Hypergiant. Leave a Comment

Just days into the new year and the cybersecurity community is already playing catch up thanks to the recent Log4j vulnerability which illuminated major setbacks in how organizations deal with its own software and open-source packages on which its relies on. In particular, organizations have been caught off guard in auditing its own systems, giving […]

Read More

ReliaQuest Expands Global Footprint with New Office in Pune, India

January 11, 2022 TechDecisions Staff Leave a Comment

Company kicks off the new year with expansion into major IT hub TAMPA, Fla.–(BUSINESS WIRE)–ReliaQuest, the leader in Open XDR-as-a-Service, today announced the opening of a new office location in Pune, Maharashtra, India. The office is the company’s first location in India. ReliaQuest plans to add more than 50 employees to its India team by […]

Read More

Royal Ransomware

Are Ransomware And Terrorism Threats Equal?

A ransomware study by Venafi indicates two-thirds of Security Professionals believe they should be prioritized the same.

January 10, 2022 Alyssa Borelli Leave a Comment

Almost two-thirds (60%) of IT decision makers believe ransomware threats should be prioritized at the same level as terrorism, according to latest research by Venafi, a Salt Lake City-based provider of machine identify management solutions. The research comes after the U.S Department of Justice raised the threat level of ransomware following the Colonial Pipeline attack […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 120
  • Page 121
  • Page 122
  • Page 123
  • Page 124
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.