• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Says Company Mitigated 2.5 Tbps DDoS Attack, Largest Ever

Google says it was the target of a massive 2.5 Tbps DDoS attack in September 2017, the highest bandwidth attack ever reported.

October 21, 2020 Zachary Comeau Leave a Comment

Google says it was the target of a massive 2.5 Tbps DDoS attack in September 2017, the highest bandwidth attack ever reported. In a blog post exploring the growth of distributed denial-of-service (DDoS) attacks, Google revealed that it was the target of a six-month campaign that utilized multiple methods of attack. “Despite simultaneously targeting thousands […]

Read More

Honeywell Fire Safety Cloud Platform

Honeywell Releases an All-in-One Fire Safety Cloud Platform

Honeywell says its fire safety cloud platform is the first open cloud solution that connects fire detection devices across a building & plugs into IoT.

October 21, 2020 TechDecisions Staff Leave a Comment

Honeywell launches ] its first all-in-one fire safety cloud platform. Honeywell’s CLSS suite of tools, built on the Honeywell Forge platform, is said to enable fire technicians to minimize disruption, prove compliance and reduce time needed for design, installation, commissioning, inspection, maintenance and reporting of life safety systems. “Today’s global environment requires the fire and […]

Read More

implementing, zero trust approach, zero trust misconceptions

The 5 Misconceptions You Probably Have About a Zero Trust Approach

We bet you've probably fell victim to one of these misconceptions about implementing a zero trust approach. That's ok, we're here to help.

October 21, 2020 Adam Forziati Leave a Comment

Zero Trust has gained significant momentum this year with the surge in pandemic-induced remote work, taking a fast track from security option to business priority. In fact, recent research from Microsoft shows 51% of business leaders are speeding up their deployment of Zero Trust capabilities. But what does Zero Trust really mean in practice and what are […]

Read More

adaptive IR cameras

Johnson Controls Tyco Illustra Essentials Line Debuts 4 New Adaptive IR Cameras

Essentials models include mini-dome, varifocal mini-dome, bullet and varifocal bullet cameras, all featuring adaptive IR.

October 20, 2020 TechDecisions Staff Leave a Comment

New adaptive IR cameras from Johnson Controls include four new models in the Tyco Illustra Essentials IP camera range. The new fourth generation Essentials mini-dome, varifocal mini-dome, bullet and varifocal bullet cameras, which supersede their respective older models, are all equipped with built-in adaptive IR illumination which enables them to capture up to two megapixel […]

Read More

Election Security

The Two Keys to Election Security

Protecting the election ecosystem from rising nation state threats requires good network security and network resilience.

October 20, 2020 Zachary Comeau Leave a Comment

With the 2020 presidential election just two weeks away, cybersecurity officials are warning that the U.S. voting system is not secure as new concerns arise around election tampering from different nation states and other bad actors. According to Todd Rychecky, vice president of network technology provider Opengear’s U.S. unit, the entire voting ecosystem is not […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? October 19 Edition

What types of cyberattacks were carried out this week, October 19, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

October 19, 2020 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, October 19, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Microsoft Azure Defender for IoT

Microsoft Releases Azure Defender for IoT in Public Preview

Azure Defender for IoT is designed to help protect and monitor industrial and critical infrastructure that depend on those devices.

October 16, 2020 Zachary Comeau Leave a Comment

Azure Defender for IoT, Microsoft’s cybersecurity solution for IoT and OT devices, has entered public preview to help protect industrial and critical infrastructure that depend on those devices. The new solution incorporates agentless, IOT/OT-aware behavioral analytics from Microsoft’s recent acquisition of CyberX. It addresses these risks by discovering unmanaged assets, identifying vulnerabilities and continuously monitoring […]

Read More

safe remote work strategy, multi-level access

Developing Safe Remote Work Strategies for Multi-Level Access

A safer remote work strategy for multi-level access frameworks requires consistent policy behind access and credentialing controls.

October 14, 2020 Adam Forziati Leave a Comment

Many companies are spending more on cloud infrastructure services than on data center hardware as they move to a cloud-first approach. But how safe are their remote work strategies overall, especially if they’re utilizing a multi-level access framework? According to Marivi Stuchinsky, SVP, Global CTO at Technologent, many businesses are unprepared for IT hardware-related support needs, […]

Read More

Progress MOVEit vulnerability

Microsoft Disrupts Trickbot Ahead of U.S. Elections

Microsoft says it teamed up with other tech organizations to take down ransomware and malware proliferator Trickbot to protect U.S. elections, industry.

October 13, 2020 Zachary Comeau Leave a Comment

Microsoft and an international group of tech industry organizations disrupted the botnet Trickbot, one of the world’s most prolific distributors of malware and ransomware. Through a court order from the U.S. District Court for the Eastern District of Virginia and technical action in coordination with a group of technology organizations, Microsoft helped cut off key […]

Read More

CNA Cyber Attack

CISA: Hackers Using Vulnerability Chaining to Target Government Networks

According to U.S. cybersecurity officials, malicious cyber attackers are using multiple vulnerabilities to infiltrate government networks.

October 12, 2020 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency, along with the FBI, have released a joint advisory warning that threat actors are actively exploiting vulnerabilities as they target government networks. The joint advisory, released last Friday, says these recent attacks are directed at federal, state, local, tribal and territorial government networks, and there is some risk […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 174
  • Page 175
  • Page 176
  • Page 177
  • Page 178
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.