• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Cybersecurity: How Hackers Identify, Penetrate Weak Company IP Networks

Hackers identify specific IP networks -- not companies -- to expose and sell to other hackers.

November 27, 2015 TechDecisions Staff Leave a Comment

Hackers identify specific IP networks — not companies — to expose and sell to other hackers.

Read More

Pell Study: U.S. Cybersecurity Preparedness Presents ‘Grim Picture’

While all 50 states are investing in broadband communications, only eight states were deemed equipped to deal with current and emerging threats from cyber espionage.

November 17, 2015 TechDecisions Staff Leave a Comment

While all 50 states are investing in broadband communications, only eight states were deemed equipped to deal with current and emerging threats from cyber espionage.

Read More

Study Finds Interesting Data on How Companies Are Managing Cyber Risk

SMU Darwin Deason Institute for Cyber Security studies how financial, retail, healthcare and government sectors manage cyber risk.

November 17, 2015 TechDecisions Staff Leave a Comment

SMU Darwin Deason Institute for Cyber Security studies how financial, retail, healthcare and government sectors manage cyber risk.

Read More

CEOs and CIOs: How to Use Military Strategies to Help Ward Off Cyber Security Threats

Most of the time, cybersecurity failures aren't technical failures. They're leadership failures.

November 11, 2015 TechDecisions Staff Leave a Comment

C-suite leaders tend to underestimate the cyber threats—a leadership failure that puts everyone at risk. Instead, take a lesson from the U.S. military.

Read More

2 Cyberthreat Vulnerabilities Colleges Need to Worry About This School Year

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

September 10, 2015 TD Staff Leave a Comment

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

Read More

New STOPit App Allows Students to Report Cyberbullying

The STOPit app helps deter cyberbullying by allowing students to anonymously report cyber abuse with their smartphones

August 19, 2015 TD Staff Leave a Comment

Students can help deter cyberbullying with the new STOPit app. Students are able to download the app directly to their smartphones. When cyber abuse occurs, students can use the app to report the incident. The report is sent directly to a cloud-based incident management system, DOCUMENTit, which notifies school administrators in real time. STOPit has recently partnered with Derek Jeter’s Turn 2 Foundation and the app is currently implemented in over 100 schools across the United States and recently expanded into Canada, Ireland, Italy, and South Africa.

Read More

Immersive Telepresence Technology Lets Rutgers Law Campuses Cyber-Combine Classrooms

Rutgers invests in an immersive telepresence solution to teach students across two separate campuses.

June 25, 2015 TD Staff Leave a Comment

When Rutgers University’s Newark and Camden Law Schools began considering a proposed merger into one, 1,100-plus student entity encompassing both locations, they invested in an immersive telepresence solution.

Read More

Integrators Identify 10 Critical Cybersecurity Challenges

Be sure your physical security systems integrator addresses these network security issues.

May 26, 2015 TD Staff Leave a Comment

Be sure your physical security systems integrator addresses these network security issues.

Read More

Beware and Barricade Cyber Barbarians at the Gate

Paul Boucherle speaks about the importance of cyber security to integrators and their customers.

May 22, 2015 TD Staff Leave a Comment

For security integrators and customers who don’t think cybersecurity’s their business, think again.

Read More

14 Questions to Ask While Evaluating Your College’s Cybersecurity Strength

IT staff from colleges across the country collaborated on cybersecurity questions and strategies at the annual ACUTA conference.

April 24, 2015 Jessica Kennedy Leave a Comment

IT staff from colleges across the country collaborated on cybersecurity questions and strategies at the annual ACUTA conference.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.