• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Atera ESET Integration

Malware-Delivering Cloud Apps Nearly Tripled in 2022

Cloud-delivered malware is now responsible for a much higher percentage of all malware delivery, Netskope research finds.

January 11, 2023 Alyssa Borelli Leave a Comment

Over 400 distinct cloud applications delivered malware in 2022, nearly tripling the amount seen in the prior year, according to the latest research from Netskope, the Santa Clara, Calif.-based SASE provider. Netskope researchers also found that 30% of all cloud malware downloads in 2022 originated from Microsoft OneDrive. As cloud apps are widely used by […]

Read More

ransomware emsisoft, organization impacted by ransomware

Education, Healthcare And Government Organizations Impacted by Ransomware in 2022

An Emsisoft report found almost twice the number of K-12 schools were impacted by ransomware in 2022 compared to 2021.

January 10, 2023 TD Staff Leave a Comment

Ransomware continues to be a significant challenge for colleges and universities, school districts, and hospitals across the country, according to a new report. The 2022 report, released Monday by digital security firm Emsisoft, determined 89 education sector organizations were impacted by ransomware. Broken down, hackers demanded ransoms from 44 universities and colleges, and 45 school districts […]

Read More

Microsoft Security RSA Conference

These are Microsoft’s 5 Identity Priorities in 2023

Microsoft outlines its five identity security priorities for the new year, with Entra tools as the key solution.

January 10, 2023 Zachary Comeau Leave a Comment

With cybercriminals hellbent on stealing passwords and compromising credentials, identity has become the new cybersecurity battleground, with Microsoft reporting more than 111 million password attacks a day. The Redmond, Wash. tech giant’s analysis of identity attacks doesn’t stop there, as the company says password breach replay attacks grew to 5.8 billion per month in 2022, […]

Read More

ChatGPT, OpenAI, iOS, Mobile, App

That Didn’t Take Long: Hackers Are Beginning to Leverage ChatGPT

Hackers are beginning to explore how to incorporate ChatGPT into their hacking activities, according to Check Point Software.

January 9, 2023 Zachary Comeau Leave a Comment

OpenAI’s conversational AI chatbot ChatGPT has captured the attention of the tech industry, with the technology already helping IT professionals and developers create scripts and write code via a free preview. The use cases extend to essentially replacing or adding to search engines to help create a more engaging experience for users looking for information. […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Expect ‘Headline-grabbing’ Log4j Attacks in 2023

Log4j bug will continue to be a critical issue for IT professionals in 2023, according to GreyNoise.

January 4, 2023 Zachary Comeau Leave a Comment

Organizations should expect to see continued cyberattacks leveraging the Log4Shell vulnerability in 2023, cybersecurity company GreyNoise Intelligence says in a new report. The Washington, D.C.-based internet scanning traffic analysis firm’s recently released report, the 2022 Mass Exploitation Report, dives deep into the most significant threat detection events of the past year, including touching on CISA’s […]

Read More

Top IT stories 2022

Our Top IT Stories From 2022

Hybrid work, cybersecurity, cloud computing, recession, and new products and services highlight this year's top IT stories.

December 29, 2022 Zachary Comeau Leave a Comment

2022 was a very busy year for IT professionals as they grappled with new trends, technologies, tools, workplace models, cyberattacks and more while they helped their organization remain productive and secure. We looked back at our coverage to find common trends in our content to bring you our top 10 stories from this past year.  […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

This Guide Can Help Small Businesses Secure Their Cloud Environments

The Australian Cyber Security Center worked with Microsoft to develop the Small Business Cloud Security Guides to help secure SMBs.

December 29, 2022 Zachary Comeau Leave a Comment

For small businesses, securing IT systems can be a challenge. From finding qualified IT talent and then paying for their salary and security tools, cybersecurity can be costly for a small business. Hackers know this, and this makes small businesses a prime target for cyberattacks. With more and more small businesses leveraging the easy-to-deploy cloud […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: Botnet, Google Chrome, Okta’s GitHub Hacked, ChatGPT

New botnet capabilities, an updated Google Chrome release schedule, an Okta security incident and more ChatGPT highlight this week's IT news.

December 22, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology news stories each week. Microsoft discovers new botnet capabilities Microsoft […]

Read More

FBI search engine ads, tablet, Gartner, worldwide device shipments

FBI: Beware of Search Engine Ads

Cybercriminals are using search engine ads to deploy malware and steal credentials, FBI says in new warning.

December 21, 2022 Zachary Comeau Leave a Comment

The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]

Read More

SASE, SASE approaches, SASE implementation

Axonius Updates SaaS Management Offering

Axonius' latest updates further enhance the comprehensive visibility and correlation across SaaS apps, devices and users, streamlining efforts to reduce organizations’ attack surface.

December 20, 2022 TD Staff Leave a Comment

Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 61
  • Page 62
  • Page 63
  • Page 64
  • Page 65
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.