• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

TikTok US Army Adopts Facial Recognition Technology, U.S. army soldiers

Do You Care If Soldiers Use TikTok? What About if it is for Recruiting Purposes?

I really, really don't care if U.S. army soldiers use Chinese-owned TikTok... unless it is used for recruitment purposes.

November 25, 2019 Adam Forziati Leave a Comment

I don’t really care what soldiers do in their free time, as long as they aren’t using their position to take advantage of any situations they shouldn’t be. Otherwise, I figure they’ve earned their right to use their downtime as they see fit. But I’m having some split thoughts on a recent U.S. Army directive […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? November 25 Edition

What types of cyberattacks were carried out this week, November 25, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

November 25, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, November 25, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? November 18 Edition

What types of cyberattacks were carried out this week, November 18, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

November 18, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, November 18, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? November 9 Edition

What types of cyberattacks were carried out this week, November 9, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

November 11, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, November 9, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

CISO Burnout

You Should Consider a Four Day Work Week

Some companies are beginning to experiment with a four-day work week. The IT industry—which is struggling with stress and hiring—should look into it.

November 11, 2019 Zachary Comeau Leave a Comment

Take a minute to think about how nice it would be to have a long weekend—every weekend, with a four day work week. Would one extra day off per week do you and your team some good? The corporate world has been experimenting with this idea recently, and the results are generally positive, with employees […]

Read More

Cloud Migration

New Trustwave Service Adds Advanced Threat Protection and Response for Azure

Trustwave's Threat Detection and Response services for Microsoft Azure helps businesses stay secure as cloud security becomes more complex.

November 8, 2019 Zachary Comeau Leave a Comment

Information security firm Trustwave has bolstered its threat monitoring, detection and response in Microsoft Azure has launched an advanced threat detection and response service for the cloud computing service. Trustwave said in an announcement earlier this week that its Threat Detection and Response services for Azure integrates with Microsoft Azure Sentinel — a cloud-native security […]

Read More

hack smart home device, smart home hacking

Researchers Have Figured Out How to Hack Smart Home Devices — With a Laser

Researchers figured out a way to hack smart home devices by manipulating voice-controlled assistants from hundreds of feet away.

November 8, 2019 Zachary Comeau Leave a Comment

As helpful as Siri, Alexa and Google Home are, cyber security experts have long warned that smart device are probably not keeping your privacy very secure. It turns out, smart home hacking doesn’t even require much technical skill. Researchers at the University of Michigan say they have found a way to take over a Google […]

Read More

Featured Video Play Icon

CrowdStrike, CounterFlow AI Partner to Accelerate Threat Detection

CrowdStrike, CounterFlow AI form partnership to leverage machine learning to more quickly detect cybersecurity threats and respond.

November 7, 2019 Zachary Comeau Leave a Comment

Counterflow AI, a systems security provider delivering artificial intelligence for IT operations, is partnering with cloud-delivered cybersecurity software firm CrowdStrike to accelerate threat detection and response for business security teams. CounterFlow AI is enhancing its machine learning engine with Falcon X, CrowdStrike’s customizable, automated incident investigation platform. According to the joint release, the integration allows […]

Read More

iPhone security, Giuliani iPhone

Giuliani iPhone: The IT Manager’s Nightmare

President Donald Trump's personal attorney and cybersecurity expert reportedly needed help at an Apple Store to unlock his iPhone.

November 5, 2019 Zachary Comeau Leave a Comment

Passwords. Let’s talk about ‘em. I’ve forgotten some. You have too. No big deal. Just click the forgotten password link and follow the steps. Hopefully you remembered which email address you used to set up the account. But the code to unlock your phone? You can probably do that in your sleep. Chances are it’s […]

Read More

Medical Device Security

Gurucul Says Medtech is Increasingly Using Security Software

Security analytics software firm Gurucul says medical device companies should invest in securing their products from cyber attacks.

October 31, 2019 Zachary Comeau Leave a Comment

Devices are being added to the network across every sector, vertical and market you can think of, and one of the most important is the medical device market. That’s creating a dangerous new attack surface, according to behavior-based security and fraud analytics tech firm Gurucul. Earlier this week, the company said its software’s use among […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 190
  • Page 191
  • Page 192
  • Page 193
  • Page 194
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.