• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

F5 headquarters, AI API

F5 Releases New AI-Powered App and API Security Tools

New AI tools from F5 give customers better protection and control in managing apps and APIs across on-premises, cloud and edge locations.

April 4, 2023 Zachary Comeau Leave a Comment

Cybersecurity company F5 is releasing new AI-powered app and API security capabilities designed to give customers comprehensive protection and control in managing apps and APIs across on-premises, cloud and edge locations. According to the Seattle-based application services and security company, new machine learning enhancements will provide the company’s cloud security portfolio with advanced API endpoint […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

These Dangerous Vulnerabilities on CISA’s KEV List Are Still Being Widely Exploited

Despite patches being available for most of the bugs in CISA's Known Exploited Vulnerabilities catalog, many devices remain unpatched.

April 3, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has been keeping an updated list of Known Exploited Vulnerabilities (KEV) that currently includes more than 900 security bugs, with the goal of helping inform organizations about vulnerabilities that should be prioritized. Despite that awareness campaign and emphasis on vulnerabilities that have been exploited in the wild, new […]

Read More

3CX Supply Chain Attack

3CX Compromised in Supply Chain Attack

A flaw in the desktop app from VoIP provider 3CX is being exploited in supply chain attacks, leading to possible hands-on-keyboard activity.

March 31, 2023 Zachary Comeau Leave a Comment

Cybersecurity researchers say a vulnerability in the desktop app from VoIP provider 3CX is being actively exploited in supply chain attacks, leading to possible hands-on-keyboard activity by advanced threat actors, including nation-state actors. According to researchers, malicious activity was observed coming from a legitimate signed binary, 3CXDesktopApp — a softphone application from 3CX. Cybersecurity firm […]

Read More

ChatGPT, OpenAI, iOS, Mobile, App

Pump the Brakes on AI Development, Tech and AI Experts Say

Thousands of AI and tech leaders say organizations should pause investments and refocus AI development to make systems more safe and trustworthy.

March 30, 2023 Zachary Comeau Leave a Comment

Ever since OpenAI released ChatGPT to the public late last year, the speed of innovation in the field of artificial intelligence–specifically generative AI–has been blistering. Tech companies are feverishly working to develop more intelligent systems and essentially add intelligent assistants to a wide range of tools to help users be more efficient and creative. But […]

Read More

Microsoft Security Copilot

Microsoft Brings Generative AI to Defenders with Security Copilot

Microsoft Security Copilot is designed to help defenders be more efficient by combining GPT-4 with a security-specific model from Microsoft.

March 28, 2023 Zachary Comeau Leave a Comment

Microsoft has infused the powers of generative AI, ChatGPT and OpenAI’s language models throughout its product portfolio, and the company is now bringing the technology to its security tools with the launch of Microsoft Security Copilot. According to Microsoft, Security Copilot will help enable defenders to leverage AI to be more efficient by combining an […]

Read More

CISA Software Security

Use This Free CISA Tool for Threat Hunting, Incident Response

CISA's Untitled Goose Tool is a free new tool designed to help network defenders detect malicious activity in Microsoft Azure, AAD and M365.

March 27, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released the Untitled Goose Tool, a free  tool designed to help network defenders detect malicious activity in Microsoft Azure, Azure Active Directory (AAD) and Microsoft 365 (M365) environments. According to CISA, the Untitled Goose Tool offers novel authentication and data gathering methods for network defenders to use […]

Read More

CISA Ransomware

CISA Wants You To Report Anything You Know About Ransomware Activity

The U.S. Cybersecurity and Infrastructure Security Agency's new initiative is designed to help organizations stop ransomware attacks early.

March 23, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is launching its Pre-Ransomware Notificaiton Initiative designed to help organizations thwart ransomware attacks in the early stages of incidents as ransomware actors dwell in a victim’s environment before deploying the ransomware. According to CISA, that window of time–which can last from hours to days–gives the agency enough […]

Read More

ServiceNow Utah

ServiceNow Releases Now Platform Utah With New AI Features

The Now Platform Utah release includes a new AI-powered search along with AI-powered process mining and RPA capabilities.

March 22, 2023 Zachary Comeau Leave a Comment

ServiceNow is releasing the Now Platform Utah, an expansion of the company’s digital workflow management platform designed to help organizations future-proof their businesses with new AI-powered process mining and robotic process automation capabilities, including a new AI-powered search feature. In addition, the Now Platform Utah release includes expanded workforce optimization tools and health and safety […]

Read More

Security Awareness Training

Security Awareness Training Needs to Change. Here’s Why.

Phishing is still wildly successful and a tried-and-true way into any organization's network, and security awareness training needs to evolve.

March 21, 2023 Zachary Comeau Leave a Comment

Despite repeated urges from IT professionals to be wary of clicking on links in emails and opening attachments from strange messages, phishing is still wildly successful as attackers adopt new tricks and techniques that should force organizations to improve and update their cybersecurity awareness strategies. In fact, email-based phishing attacks remain a thorn in the […]

Read More

Password Manager, login stress, passwordless authentication

NordVPN Steps Further into Passwordless Future with NordPass

NordVPN's latest step towards changing market conditions around a passwordless future is NordPass, a solution to store and manage passkeys.

March 17, 2023 Alyssa Borelli Leave a Comment

In a move towards a passwordless future, advanced security and privacy provider NordVPN has developed NordPass, a solution to store and manage passkeys. With Microsoft, Apple and Google leaning into passkeys for online authentication, NordPass says its new release will help internet users adapt to the market change without compromising on security and convenience. “If […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 55
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.