• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Software Vendor Trust

How to Vet a Vendor’s Transparency and Trustworthiness

With the rise of the cloud and SaaS, organizations should demand transparency of their tech vendors. Here's how to vet their trustworthiness.

August 4, 2022 Zachary Comeau Leave a Comment

Has your organization ever found out about a technology vendor’s security incident from news reports rather than a transparent disclosure to customers from the vendor itself? If so, and that vendor has not profusely apologized for not disclosing that incident, then it may be time to cut bait with that particular provider. That is especially […]

Read More

Microsoft Security RSA Conference

Microsoft Launches Defender Experts for Hunting

Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint.

August 3, 2022 Zachary Comeau Leave a Comment

Microsoft is helping organizations add to their security operations center’s threat hunting capabilities with Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint. According to Microsoft, experts will hunt for suspicious activity across endpoints, Office 365, cloud app and identities, and hand off that contextual alert […]

Read More

Home Office Cybersecurity security

5 Tech Security Ideas for Creating a Safe Home Office

When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed.

August 2, 2022 Kate Jones Leave a Comment

Working from home can create a great sense of freedom and flexibility, but it comes with its challenges. When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed for optimal protection. Should someone hack into your home office or Wi-Fi network, your computer and […]

Read More

ATEN_KVM Switches

ATEN Technology, Inc. Introduces New Suite of Secure KVM Switches

ATEN's latest KVM switches are ideal for highly sensitive applications in government, healthcare, banking and other industries.

August 1, 2022 TD Staff Leave a Comment

ATEN Technology, Inc., the Irvine, Calif.-based manufacturer of KVM and AV/IT connectivity and management solutions, announced a new suite of secure KVM solutions that are National Information Assurance Partnership (NAIP) certified PP v4.0. The switches are ideal for highly sensitive applications that demand isolation between different network security enclaves, such as in government, military, healthcare, […]

Read More

Microsoft 365 domain, cloud.microsoft

With Microsoft Office Macros Blocked by Default, Hackers are Using Other Techniques

New Proofpoint research show how threat actors are adapting to Microsoft blocking Office macros by default by leveraging other file types.

July 29, 2022 Zachary Comeau Leave a Comment

After pausing the rollout of a default macro-blocking feature in Microsoft Office, Microsoft is now officially blocking VBA macros by default in Office applications in a move to make it harder for threat actors to deploy malware and ransomware using Office applications. Microsoft first announced the VBA macro blocking in February 2022, just a few […]

Read More

SolarWinds IT Pro Day

This Week in IT: AWS Security, ISS Threats, Windows 10 Update, Semiconductor Funding

New AWS security features, research on ISS threats, Windows 10 version 22H2 and funding for semiconductors highlight this week's IT news.

July 28, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. New AWS Security Features Amazon this week announced two key new security […]

Read More

Palo Alto Networks Prisma SASE Accenture

ProxyShell, Log4Shell Among Most Exploited Security Bugs

New cybersecurity trends report from Palo Alto Networks finds that attackers are quickly exploiting new vulnerabilities.

July 27, 2022 Zachary Comeau Leave a Comment

Updating systems and patching security vulnerabilities has always been a key part of the job for any IT or security professional, but a new report from cybersecurity giant Palo Alto Networks sheds new light on just how quickly threat actors are leveraging new vulnerabilities. The Santa Clara, Calif.-based security software provider’s Unit 42 Incident Response […]

Read More

Infosec, Cybersecurity Awareness

Security Awareness Training Is Not Effective, New Research Suggests

About one-third of end users do not think they are responsible for cybersecurity, and just half find security awareness training effective, Tessian report finds.

July 26, 2022 Zachary Comeau Leave a Comment

Organizations’ IT and cybersecurity professionals are struggling to spread security awareness and build security into their workplace culture, with a shocking percentage of employees responding to a recent study that they are simply unaware of cybersecurity issues and don’t find security awareness training effective. According to a recent report from cloud email security software provider […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Log4Shell Will Remain an Issue For a Decade

The Log4Shell bug will remain an issue for IT and security teams for possibly a decade or longer, says new Cyber Safety Review Board report.

July 25, 2022 Zachary Comeau Leave a Comment

The critical vulnerability discovered late last year in the popular Java logger Log4j will be impacting IT environments for years due to the difficulty in finding and remediating vulnerable instances of the tool, according to a new report from the U.S. Department of Homeland Security’s Cyber Safety Review Board. The board—established in the wake of […]

Read More

SolarWinds IT Pro Day

This Week in IT: Cloud Partnership, Apple Security Updates, Outages, LAPSUS$

A Microsoft and Oracle partnership, Apple security fixes, services outages and cybersecurity headline this week's IT news.

July 21, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft, Oracle announce general availability of Database Service for Microsoft […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 72
  • Page 73
  • Page 74
  • Page 75
  • Page 76
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.