• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Red Hat Summit, AI, Enterprise Linux

Red Hat Summit 2023 Releases: AI, Automation, IT Management, Security

Generative AI, automation, IT management and security features highlight Red Hat's new product launches at Red Hat Summit.

May 24, 2023 Zachary Comeau Leave a Comment

Red Hat is holding its annual Red Hat Summit event this week and judging by the enterprise open source software giant’s product announcements, the company is keying in on AI, automation, security and productivity enhancements. Like other tech giants, the company used its event to make important announcements in generative AI to help accelerate its […]

Read More

Tenable Splunk

Tenable, Splunk Launch Partnership for Risk Prioritization

Tenable and Splunk have launched a new partnership designed to help security teams better correlate events and take action on flaws.

May 23, 2023 Zachary Comeau Leave a Comment

Vulnerability management provider Tenable and IT management platform Splunk have launched a new partnership designed to help security teams better correlate events, take action on flaws and meet compliance standards. The partnership combines Tenable’s vulnerability management insights with Splunk’s log and flow consolidation capabilities to help simplify risk prioritization, accelerate threat response and reduce overall […]

Read More

Dell, Cybersecurity, Security, Zero Trust, Project Fort Zero

Dell’s Project Fort Zero Will be a Fully Configured Zero Trust Solution

Dell's Project Fort Zero, coming in the next 12 months, is a fully configured solution designed to lower the barrier to entry for zero trust.

May 23, 2023 Zachary Comeau Leave a Comment

Dell is aiming to provide an end-to-end zero trust security solution with Project Fort Zero, a new fully configured solution designed to lower the barrier to entry for zero trust adoption. According to Dell, the Project Fort Zero solution builds on the momentum of the company’s Zero Trust Center of Excellence and partner ecosystem to […]

Read More

Zero Trust

First Steps to Take for Zero Trust Implementation

Implementing zero trust policies can seem like a daunting task, but IT leaders should begin with these first steps.

May 23, 2023 Zachary Comeau Leave a Comment

Zero trust has emerged as a key IT security policy that is designed to help organizations be more secure by essentially assuming a breach has already occurred and requiring a user, device, application and transaction to be authenticated and verified each time they access an application, not just at the network perimeter. However, implementing zero […]

Read More

Barracuda ESG

Barracuda Launches New SASE Platform for Businesses, MSPs

Barracuda SecureEdge is a new SASE solution designed to make hybrid and remote work environments easier to secure.

May 22, 2023 Zachary Comeau Leave a Comment

Cybersecurity solutions provider Barracuda Networks is launching Barracuda SecureEdge, a new SASE solution designed to make hybrid and remote work environments easier to secure with integration into SD-WAN, firewall, zero trust and secure web gateway solutions. According to the Campbell, Calif. cloud-first security company, its single-vendor SASE service is designed to help businesses and managed […]

Read More

Business email compromise

Business Email Compromise is on the Rise

Business email compromise attacks are increasing in sophistication, allowing attackers to quietly take over email accounts, Microsoft says.

May 22, 2023 Zachary Comeau Leave a Comment

Business email compromise has emerged as a critical threat as threat actors shift their tactics and increase the sophistication of attacks designed to takeover business emails, including leveraging residential IP addresses to hide the attacks, Microsoft says in a new Cyber Signals report. The report, the fourth such edition of Microsoft’s cybersecurity research report, finds […]

Read More

Bitwarden Passwordless.dev

Bitwarden Launches Passwordless.dev to Simplify Passkey Implementation

Bitwarden Passwordless.dev is a developer toolkit with an API for integrating FIDO2 WebAuthn-based passkeys into enterprise applications.

May 19, 2023 Zachary Comeau Leave a Comment

Open-source password manager Bitwarden is launching the general availability of Bitwarden Passwordless.dev, a developer toolkit with an API for integrating FIDO2 WebAuthn-based passkeys into consumer websites and enterprise applications. Bitwarden’s release comes as tech firms are investing heavily in passwordless technologies in the hopes that it will essentially eliminate a major vector of cyberattacks and […]

Read More

Zerto 10, ransomware

Zerto Launches Zerto 10 for Enhanced Disaster Recovery, Ransomware Mitigation

Zerto 10 is a new disaster recovery solution designed to enhance disaster recovery and detect encryption in real time.

May 18, 2023 Zachary Comeau Leave a Comment

Disaster recovery and ransomware resilience firm Zerto is launching Zerto 10 for Microsoft Azure, a new disaster recovery solution designed to enhance disaster recovery and mobility for complete infrastructure flexibility. The company also unveiled new real-time encryption and detection features and a new air-gapped recovery vault to help mitigate a ransomware attack. According to the […]

Read More

MOVEit, ransomware, CVE-2023-34362,

BianLian Ransomware Group Skips Encryption and Goes Straight to Exfiltration

The BianLian group is a ransomware actor that is targeting organizations with a data extortion model, bypassing traditional encryption.

May 17, 2023 Zachary Comeau Leave a Comment

Cybersecurity officials the, FBI, Microsoft and Sophos are warning organizations to limit their use of some legitimate tools as they are being leveraged by the BianLian group, a ransomware group that has targeted organizations with a data extortion model, bypassing the need to encrypt victims’ data. According to a joint advisory from CISA, its Australian […]

Read More

Garter infrastructure trends. Data center concept based isometric design, illustration of main server connected with cloud server on glossy blue background.

These Four Trends Are Shaping the Future of IT Infrastructure

Optimizing cloud infrastructure, new app architectures, adopting cloud principles on-premises and prioritizing skills growth are key trends.

May 16, 2023 TD Staff Leave a Comment

Gartner highlighted four trends impacting cloud, data center and edge infrastructure in 2023, as infrastructure and operations (I&O) teams pivot to support new technologies and ways of working during a year of economic uncertainty. Speaking at the Gartner IT Infrastructure, Operations & Cloud Strategies Conference in Sydney, Paul Delory, VP Analyst at Gartner said, “In […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 50
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.