• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

izzi Taps Verimatrix XTD and Streamkeeper to Protect Its Popular Media Apps, Endpoint

June 29, 2022 TechDecisions Staff Leave a Comment

Anti-piracy and extended threat defense technologies to monitor millions of unmanaged devices for izzi tv, izzi go AIX-EN-PROVENCE, France & SAN DIEGO–(BUSINESS WIRE)–Regulatory News: Verimatrix, (Euronext Paris: VMX) (Paris:VMX), the leader in powering the modern connected world with people-centered security, today announced that izzi , a mexican telecommunications firm that offers the country’s popular izzi […]

Read More

BenQ InstaShow WDC30

BenQ Releases InstaShow WDC30 for Most Secure Wireless Presentation

BenQ says its new its new InstaShow WDC30 is its most secure wireless presentation system to date with three layers of protection.

June 29, 2022 TD Staff Leave a Comment

BenQ, the Costa Mesa, Calif.-based provider of visual display solutions, announced its mot secure wireless presentation system to date — the new ultra-secure InstaShow WDC30. It features three layers of wireless protection: Wi-Fi 6 encryption, ISO EAL6+ and FIPS 140-3. BenQ says the InstaShow WDC30 is engineered and certified to meet the security requirements of […]

Read More

AuditBoard Ranked #1 in G2 Summer 2022 Audit Management Software and GRC Grid Reports

June 29, 2022 TechDecisions Staff Leave a Comment

The modern connected audit, risk, and compliance platform also wins plaudits from customers for its ease of use, frictionless implementation, and superior results. LOS ANGELES–(BUSINESS WIRE)–AuditBoard, the leading cloud-based platform transforming audit, risk, and compliance management, today announced it has once again been rated as the Market Leader in the Audit Management and GRC Summer […]

Read More

Token Announces $13 Million Series B Funding Round and Appointment of New CEO to Disrupt the Authentication Market

June 29, 2022 TechDecisions Staff Leave a Comment

Investment led by Grand Oaks Capital to accelerate development of innovative wearable biometric authentication solutions. ROCHESTER, N.Y.–(BUSINESS WIRE)–#authentication—Token, a revolutionary provider of secure, wearable authentication solutions, today announced a $13 million financing round and the appointment of John Gunn as the company’s CEO. Token will use the funds to increase its investment in solution development […]

Read More

CrowdStrike Falcon Pro for Mac Achieves 100% Malware Protection, Wins Fifth AV-Comparatives Approved Mac Security Product Award

June 28, 2022 TechDecisions Staff Leave a Comment

Award validates CrowdStrike’s industry leadership in proactively protecting customers against today’s most advanced attacks AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced CrowdStrike Falcon Pro for Mac has won a fifth consecutive Approved Security Product award from leading independent testing organization AV-Comparatives, achieving the […]

Read More

Cyber technology security lock on screen, network protection

Why Security Technology Convergence is Crucial to Future-Proofing the Workplace

When it comes to maintaining the security of workplace IT and technology systems, a holistic approach to physical and cybersecurity can help teams create a more robust security posture.

June 28, 2022 Andi Krebs Leave a Comment

Today’s commercial technology stacks are increasingly leveraging IoT and the cloud to make managing businesses more efficient: people are more reliant on technology in order to use, access, and manage their offices. This trend holds true for workplace security systems, too. Now, we’re seeing higher mobile credential adoption for commercial access control systems, increased migration […]

Read More

Codenotary First to Provide Continuously Updated and Fully Searchable Tamper-Proof Information about Software Components in Container Images

June 28, 2022 TechDecisions Staff Leave a Comment

SBOM Operator for Kubernetes allows users to continuously be aware of all software and software dependencies running in Kubernetes HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today launched SBOM Operator for Kubernetes in both its open source Community Attestation Service, as well as Codenotary’s Trustcenter, the company’s flagship product, that mitigates the risk of […]

Read More

Microsoft Fortra healthcare ransomware

WatchGuard: Ransomware on Pace for Record Year

WatchGuard Technologies says ransomware detections doubled the total number of detections for all of 2021 in just the first quarter.

June 28, 2022 Zachary Comeau Leave a Comment

Despite increased law enforcement pressure on the ransomware industry and an IT community that has never been more aware of the ransomware threat, ransomware detections had already doubled the total number of detections for all of 2021 in just the first quarter, according to a new report from WatchGuard Technologies. The cybersecurity firm’s researchers say […]

Read More

New Ivanti Research Finds that 49% of Employees are Frustrated by Work Provided Tech and 26% are Considering Leaving their Job Because of it

June 28, 2022 TechDecisions Staff Leave a Comment

The research uncovered 64% of employees believe their experience with technology impacts their morale, but only 20% of the C-Suite put budget toward improving the digital employee experience, and only 21% of IT leaders prioritize end user experience when selecting a tool SALT LAKE CITY–(BUSINESS WIRE)–Ivanti, the provider of the Ivanti Neurons automation platform that […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Log4Shell Exploitation Continues, Agencies Warn

Multiple hacking groups are leveraging the vulnerability in the ubiquitous Log4J tool six months after it was first discovered, CISA says.

June 24, 2022 Zachary Comeau Leave a Comment

More than six months after the Log4Shell vulnerability was discovered in the widely used Java logger Log4j, cybersecurity agencies are warning of the continued exploitation of the bug in unpatched VMWare Horizon and Unified Access Gateway servers. The U.S. Cybersecurity and Infrastructure Agency (CISA), along with the U.S. Coast Guard Cyber Command (CGCYBER), say malicious […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 76
  • Page 77
  • Page 78
  • Page 79
  • Page 80
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.