• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New Tool To Help Automate Vulnerability Remediation

Palo Alto Networks is releasing Xpanse Active Attack Surface Management, a new tool designed to automate security fixes.

December 12, 2022 Zachary Comeau Leave a Comment

Palo Alto Networks is releasing Xpanse Active Attack Surface Management, a new tool built into the cybersecurity solution provider’s Cortex platform designed to help security teams actively find and fix known and unknown internet-connected risks. According to the Santa Clara, Calif.-based company, Xpanse Active Attack Surface management (Xpanse Active ASM) is designed with automation to […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Software Inefficiencies are Costing U.S. Economy Trillions, Study Says

Vulnerabilities, software supply chain problems and technical debt could be costing the U.S. economy $2.4 trillions, Synopsys report finds.

December 6, 2022 Zachary Comeau Leave a Comment

Software quality issues such as vulnerabilities, software supply chain problems and technical debt could be costing the U.S. economy trillions, according to a new report from electronic design automation solutions and services firm Synopsys. The Mountain View, Calif. company’s report, “The Cost of Poor Software Quality in the US,” finds that software quality issues may […]

Read More

Malware file types, HP Wolf security

HP: Archive File Format Use Among Hackers on the Rise

Archive files such as ZIP and RAR files are the file type of choice for malware delivery, according to a new report from HP Wolf Security.

December 5, 2022 Zachary Comeau Leave a Comment

Office files are no longer the most common file type for delivering malware, as archive file formats such as ZIP and RAR files are the file type of choice for threat actors to deliver malware, according to a new report from HP Wolf Security. The findings come from a quarterly report from HP’s endpoint security […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: AWS re:Invent, Cuba Ransomware, LastPass Incident

AWS innovations, a new advisory on the Cuba ransomware group and another security incident at LastPass highlight this week's IT news.

December 1, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology news stories each week. AWS re:Invent Announcements Amazon Web Services […]

Read More

NETSCOUT UC&C, videoconferencing, meeting room, conference room

How to Optimize Conferencing Spaces for Hybrid Meetings

Optimizing conferencing spaces to accommodate hybrid work models and meetings starts with thoughtful conference room design.

November 30, 2022 Mike Walsh Leave a Comment

It’s no secret that the hybrid workforce is here to stay. A recent Gallup study found that hybrid work has increased from 32% in 2019 to 42% in February 2022, and is anticipated to rise to 53% in 2022 and beyond. This means that businesses must adjust day-to-day operations, including meetings, to accommodate about half […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

SMBs Are Struggling With Cloud Security

While cloud computing is helping organizations modernize operations and be more agile, cloud technology is also introducing new threats.

November 29, 2022 Zachary Comeau Leave a Comment

While cloud computing is helping organizations modernize their operations and be more agile, cloud technology is also introducing new threats, according to cybersecurity firm Sophos. The U.K.-based cybersecurity service company published results of a recent survey of IT professionals at small and mid-size organizations, finding that 56% of infrastructure-as-a-service (IaaS) users saw an increase in […]

Read More

Zero Trust, Leostream, AWS

Department of Defense Outlines Zero Trust Strategy, Roadmap

The DoD's Zero Trust Strategy and Roadmap is a guiding document designed to aid the implementation of a Zero Trust architecture by 2027.

November 23, 2022 Zachary Comeau Leave a Comment

The U.S. Department of Defense (DoD) has released its Zero Trust Strategy and Roadmap, a guiding document designed to aid the department’s implementation of a Zero Trust security architecture by 2027. According to the department, the strategy “envisions a DoD Information Enterprise secured by a fully implemented, Department-wide Zero Trust cybersecurity framework that will reduce […]

Read More

Retail Theft

Security Technology Tips for Retailers During Holiday Shopping

The holiday shopping season is upon us, so here are some ways to leverage technology to help prevent retail theft.

November 21, 2022 Zachary Comeau Leave a Comment

With the holidays around the corner and Black Friday shoppers set to hit the stores this week, one managed service provider that specializes in retail security is urging retailers to leverage technology to help prevent theft. Interface Systems, a Missouri-based provider of security, managed network, communications and business intelligence solutions to distributed enterprises, says retailers […]

Read More

Dell, Cybersecurity, Security, Zero Trust, Project Fort Zero

Dell Adds New Multi-cloud Data Protection and Security Offerings

Dell's new PowerProtect Manager Appliance and other innovations are designed to help customers improve operational security and resiliency.

November 17, 2022 Zachary Comeau Leave a Comment

Dell is expanding its data protection appliances and software offerings to help organizations protect data on premises, in public clouds and at the edge. Key among these are software advancements and a new appliance with Dell PowerProtect Data Manager, the company’s data protection software, designed to help customers improve operational security and cyber resiliency. According […]

Read More

Twitter phishing, security, cybersecurity

Beware of Twitter Phishing Scams As Musk Takeover Unfolds

Cybersecurity experts are warning of significant security risks stemming from organizational changes at Twitter.

November 16, 2022 Zachary Comeau Leave a Comment

With Twitter constantly in the news due to large-scale shifts in the social media company’s strategy after the takeover of Elon Musk, cybersecurity professionals are warning of new phishing scams and security risks as the new story continues to play out. Billionaire and CEO of Tesla and SpaceX Elon Musk finalized his $44 billion acquisition […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • Page 67
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.