• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

IHSE USA Draco tera IP Gateway.

IHSE USA Introduces Draco tera IP Gateway

Users have the ability to bridge multiple KVM matrices over existing IP networks with IHSE's Draco tera IP Gateway.

September 1, 2022 TD Staff Leave a Comment

IHSE USA announced a new solution: Draco tera IP Gateway. The Cranbury, N.J.-based company is, of course, a prominent KVM provider. The Draco tera IP Gateway provides users with the ability to bridge multiple KVM matrices over existing IP networks within buildings, across campuses and between remote corporate offices. Integrating the high levels of security […]

Read More

Microsoft Fortra healthcare ransomware

Microsoft: This is How to Protect Against Ransomware

Microsoft says securing identities, hardening cloud infrastructure and leveraging comprehensive security tools will help protect against ransomware.

September 1, 2022 Zachary Comeau Leave a Comment

Microsoft has outlined its three strategies to protect against ransomware and the growing as-a-service cybercrime economy that has taken hold among ransomware groups. As well as investing in “integrated threat protection across devices, identities, apps, email, data and the cloud,” Microsoft suggests organizations take three key strategies to protect against ransomware, including preparing a defense […]

Read More

CISA Software Security

CISA Warns of Quantum Computing Vulnerabilities

U.S. cyber agency's new guide warns of vulnerabilities and outlines the actions critical infrastructure stakeholders should take now.

August 29, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new guide that outlines the actions critical infrastructure stakeholders should take now to prepare for their future migration to the post-quantum cryptographic standard that the National Institute of Standards and Technology (NIST) will publish in 2024. In the guide, CISA says both the public […]

Read More

cybersecurity Proofpoint compliance

Proofpoint Launches Intelligent Compliance Platform

Proofpoint's intelligent compliance solution offers enterprises regulatory compliance safeguards while simplifying corporate legal protection practices.

August 26, 2022 TD Staff Leave a Comment

Proofpoint, the Sunnyvale, Calif., cybersecurity and compliance company launched an intelligent compliance platform, offering enterprises regulatory compliance safeguards while simplifying corporate legal protection practices. The platform leverages Proofpoint’s proprietary machine learning engine to provide business leaders with AI powered collection, clarify classification, detection, prevention, search, e-discovery, supervision and next gen predictive analytics while meeting complex […]

Read More

LastPass Breach, Hack

LastPass Confirms Security Incident

LastPass has detected unusual activity within portions of its development environment. No customer data or encrypted password vaults were compromised, says the company.

August 26, 2022 Alyssa Borelli Leave a Comment

LastPass, the Boston-based cloud security password and identity management solutions provider confirms it has detected unusual activity within portions of its development environment. No customer data or encrypted password vaults were compromised, according to the company. The unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and […]

Read More

password manager, Hitachi ID, HYPR, Bravura OneAuth, passwordless

Hitachi ID and HYPR Accelerate Path to Passwordless Future

Hitachi ID's partnership with HYPR has elevated the Bravura Security Fabric, enabling customers to eliminate passwords across critical workflows.

August 22, 2022 TD Staff Leave a Comment

Credentials are the most popular targets of hackers, who are only growing more sophisticated in their ability to automate attacks that bypass traditional forms of multi-factor authentication. Organizations are stuck between having their security teams add increasing complexity in a race to protect credentials and a user experience getting progressively cumbersome. Hitachi ID has partnered […]

Read More

Microsoft Apple macOS bug

Patch Now: Apple Releases Fixes for Two Actively Exploited Zero-Day Bugs

Apple has discovered two actively exploited zero-day vulnerabilities that could give attackers full access to a wide range of Apple devices.

August 19, 2022 Zachary Comeau Leave a Comment

Apple has discovered two actively exploited zero-day vulnerabilities that could give attackers full access to a wide range of Apple devices, prompting the company to release security updates and urging users to apply the fixes immediately. According to Apple, the two zero-day out-of-bounds write bugs affect iPhone 6s and later, all iPad Pro models, iPad […]

Read More

Google, Bard

Google Releases Curated Detections in Chronicle

Curated detections in the Chronicle SecOps Suite are designed to help organizations detect sophisticated attacks and reduce alert fatigue.

August 18, 2022 Zachary Comeau Leave a Comment

Google is launching the general availability of curated detections as part of its Chronicle SecOps Suite to help organizations detect sophisticated attacks and make up for the shortage of cybersecurity talent. According to the company, the detections are built by the Google Cloud Threat Intelligence team and are actively maintained to reduce manual toil in […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Episode 170: Protecting Against Supply Chain Attacks

Vijay Viswanathan of Open Systems joins the podcast to talk about creating a cybersecurity model that protects against supply chain attacks.

August 18, 2022 Zachary Comeau Leave a Comment

Vijay Viswanathan of Open Systems joins the podcast to talk about creating a cybersecurity model that protects against supply chain attacks.

Read More

Fortinet, ransomware, zero day vulnerabilities, log4shell

Ransomware, Zero-Day Vulnerabilities On the Rise

Ransomware variants and the use of zero-day vulnerabilities continued their upward tend in the first half of 2022, Fortinet report says.

August 17, 2022 Zachary Comeau Leave a Comment

The number of new ransomware variants nearly doubled in the first half of 2022 and attackers are increasingly leveraging zero-day vulnerabilities, painting a dire picture for IT and cybersecurity professionals, according to a new report from cybersecurity solutions provider Fortinet. According to the company’s FortiGuard Labs Threat Landscape report for the first half of 2022, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 70
  • Page 71
  • Page 72
  • Page 73
  • Page 74
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.