• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Malware Google Authenticator

The United States is ‘Not Prepared’ for Serious Cyber Attacks and Politicians are Asking Hackers for Help

According to a panelists of US congresspeople and ethical hackers, the United States government is not prepared for serious cyber attacks.

August 16, 2019 Adam Forziati Leave a Comment

Politicians at the DEF CON hacking conference implored ethical hackers to take up the fight against serious cyber attacks — something they said the United States is still underprepared for. According to this article from The Register, a UK-based publication, US representatives Ted Lieu (D-CA) and James Langevin (D-IL) were joined by hackers Cris Thomas, aka Space […]

Read More

most important cybersecurity training tips

Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees

We highlight the most critical cybersecurity training tips for employees because every business, whether big or small, experiences cyber threats.

August 6, 2019 David Share Leave a Comment

It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threat to a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This means you could probably stand to receive a […]

Read More

IntelliGO

Why IntelliGO, an AI-Cybersecurity Company, Received Recognition Two Years in a Row

IntelliGO Networks has once again received recognition from Gartner Market Guide for their SaaS AI cybersecurity solution.

July 23, 2019 TechDecisions Staff Leave a Comment

IntelliGO Networks Inc., an AI cybersecurity firm, has been recognized in the 2019 Gartner Market Guide for Managed Detection and Response (MDR) Services – an analyst publication aiming to help business leaders determine whether MDR is right for them. This is the second year in a row the firm was listed as a representative vendor for […]

Read More

Hacking

The Biggest Targets of Cyber Attacks and How to Prepare For Them

Christopher Krebs discusses recent phishing incidents, who is affected, and what can be done to prevent cyberattacks in the future.

July 17, 2019 Jessica Messier Leave a Comment

Christopher Krebs discusses recent phishing incidents, who is affected, and what can be done to prevent cyberattacks in the future.

Read More

CyberData InformaCast Enabled ceiling speaker

CyberData’s New Ceiling Speaker is InformaCast Enabled

InformaCast enabled Ceiling Speaker from CyberData is a PoE and VoIP public address product designed to accommodate strict budgets.

July 11, 2019 TechDecisions Staff Leave a Comment

CyberData’s new InformaCast Enabled Ceiling Speaker, a PoE and VoIP public address product, receives InfaCast messages or messaging from a multicast source. The device carries a competitive price without sacrificing quality, the company says. Multicast speakers “Multicast refers to a group communication mechanism where audio data can be transmitted to multiple destinations simultaneously,” the company […]

Read More

Hacking

Offensive Security Offers Training and Certification for Enterprise Cyber Skills

Offensive Security has made it easy to invest in cybersecurity training and certification through its new OffSec Flex Program. Enterprises can puchase blocks of hands-on security training and use as needed.

July 5, 2019 TechDecisions Staff Leave a Comment

Offensive Security has made it easy to invest in cybersecurity training and certification through its new OffSec Flex Program. Enterprises can puchase blocks of hands-on security training and use as needed.

Read More

Threat Runner from HORNE Cyber Allows Testing of Network Response to Malware

HORNE Cyber has launched Threat Runner, a software that allows organizations of any size to safely test how their networks will respond to real malware like Wannacry, Satan and Cerber.

July 5, 2019 TechDecisions Staff Leave a Comment

HORNE Cyber has launched Threat Runner, a software that allows organizations of any size to safely test how their networks will respond to real malware like Wannacry, Satan and Cerber.

Read More

cyber security

Indegy Offers Cloud-based Industrial Cyber Security as a Service (ICSaaS)

New version of cyber security suite also provides real-time threat intelligence sharing for any size business.

June 25, 2019 Lisa Montgomery Leave a Comment

New version of cyber security suite also provides real-time threat intelligence sharing for any size business.

Read More

Defendify cybersecurity platform

Why Investors Put Over a Million into the Defendify Cybersecurity Platform

The Defendify cybersecurity platform just received major backing from investors. Here's what separates it from other solutions on the market.

June 20, 2019 Adam Forziati Leave a Comment

Over half of small businesses in the U.S. said they’ve experienced some kind of cyberattack within the past 12 months, says a Hiscox Cyber Readiness Report. Yet many lack a way to alert, diagnose, and solve these security concerns in a holistic way — and for a reasonable price. Recent funding gained by Defendify, a SaaS-delivered […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

Do you still trust the "Trust but Verify" model of cyber security? These companies don't, and neither should you, says a "Zero Trust Security" proponent.

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.