• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

Primeview Global 21:9 digital displays for videoconferencing

Primeview Introduces 21:9 Digital Displays for Videoconferencing

Primeview's 21:9 digital displays for videoconferencing places both in-room and remote meeting participants face-to-face, life-sized and at eye-level.

April 14, 2022 TD Staff Leave a Comment

Primeview Global, a New York-based developer of enterprise display technology, announced two new lines of 21:9 aspect-ratio solutions. Per the company, the new solutions will help revolutionize the modern conference room and are compatible with the latest advances in videoconference technology. The FusionMAX 21:9 Pro LED and PanoLCD series displays feature an ultra-wide, 105″ diagonal […]

Read More

ThreatConnect Launches 6.5 Release to Enable Smarter Security Operations, Achieves SOC 2 Compliance

April 13, 2022 TechDecisions Staff Leave a Comment

Latest release allows for threat intelligence and security operations analysts to more easily perform investigations and analysis in one unified platform ARLINGTON, Va.–(BUSINESS WIRE)–ThreatConnect Inc.®, the leader in enabling risk-led, intelligence-driven security operations, is announcing the achievement of SOC2 compliance and the release of ThreatConnect 6.5. This release introduces new capabilities that provide security operations […]

Read More

Zero Trust, Leostream, AWS

iboss Launches Policy Manager For Zero Trust Implementation

iboss has released its new Zero Trust Policy Manager designed to enable organizations of all sizes to implement zero trust policies.

April 13, 2022 Zachary Comeau Leave a Comment

Zero trust edge cloud security provider iboss has released its new Zero Trust Policy Manager designed to enable organizations of all sizes to implement zero trust policies in their IT environment. The Boston-based company’s Zero Trust Policy Manager (ZTPM) helps organizations implement zero trust in accordance with the new federal guidelines from the National Institute […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Malware Developers Are Targeting These 10 2021 Security Bugs

Research from Skybox Security finds that security 2021 bugs in Log4j and Exchange Server are the most targeted by malware developers.

April 13, 2022 Zachary Comeau Leave a Comment

Security analysts at Skybox Security uncovered a 42% increase in new ransomware programs targeting known vulnerabilities last year, including critical vulnerabilities discovered in Log4j and Exchange Server. The San Jose, Calif. cybersecurity company’s 2022 Vulnerability and Trends Report, released this week, details how quickly hackers capitalize on new security bugs and continue to reduce the […]

Read More

AppOmni Introduces the AppOmni Developer Platform to Provide Universal SaaS Security Across All Enterprise SaaS Applications

April 13, 2022 TechDecisions Staff Leave a Comment

The first solution in the market to deliver common security capabilities and complete visibility into risk across applications, the AppOmni Developer Platform enables organizations to secure their entire SaaS environment SAN FRANCISCO–(BUSINESS WIRE)–AppOmni, the leading provider of SaaS security, today unveiled the AppOmni Developer Platform, which enables organizations to extend visibility and ensure consistent protection […]

Read More

McAfee ransomware attack

Organizations are Under-Prepared to Effectively Mitigate Against the Risks and Impact of Ransomware Attacks

A skills shortage and a dependence on internal resources for response posture is putting organizations at risk.

April 13, 2022 TD Staff Leave a Comment

Gaps in readiness are impacting the ability of many organizations to manage and recover from ransomware attacks, according to research by Zerto, a Boston-based cloud data management and protection platform. This gap poses a risk to mitigation strategies presented by widespread skills shortages and over-reliance on internal resources. One of the best protections against a […]

Read More

QpiAI and QuantrolOx sign a MoU to jointly develop India’s first 25-qubit quantum computing testbed and offerings for the European and Indian markets

April 13, 2022 TechDecisions Staff Leave a Comment

QpiAI signed a Memorandum of Understanding (MoU) with Anglo-Finnish quantum control software company QuantrolOx QpiAI is opening an office in Finland QpiAI and QuantrolOx will jointly develop 25-qubit quantum computing testbeds, accelerating the Indian quantum ecosystem and enable commercialization of Quantum computing with 2048 commercial grade qubits Vishal Chathrath, CEO of QuantrolOx and Prof. Andrew […]

Read More

Fortinet Vulnerability, Fortigate

April 2022 Patch Tuesday: 10 Critical Microsoft Bugs, RCEs and More

Microsoft has released patches for 128 CVEs this Patch Tuesday, including several critical bugs that admins should patch quickly.

April 12, 2022 Zachary Comeau Leave a Comment

IT admins have a lot of patching to do this month as Microsoft has released patches to address nearly 130 security vulnerabilities, including 10 critical bugs and three with a CVSS of 9.8. According to Zero Day Initiative (ZDI), the vulnerability disclosure initiative of cybersecurity firm Trend Micro, this volume of patches has not been […]

Read More

Why Healthcare Needs Better Data Security

A staggering 44,993,618 healthcare records were exposed or stolen in 2021, organizations must be more proactive in securing patient data.

April 12, 2022 Brian Foy Leave a Comment

As the healthcare industry accelerates into an increasingly digitized world, cyber breaches exposing confidential patient data are becoming more commonplace. In fact, according to the Department of Health and Human Services’ Office for Civil Rights’ breach portal, a staggering 44,993,618 healthcare records were exposed or stolen in 2021. The implications of these security breaches are […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Supply Chain Attacks Jump 51% In Second Half of 2021

Malicious actors are increasingly attacking the software supply chain, leading to renewed calls for supplier transparency.

April 12, 2022 Zachary Comeau Leave a Comment

Recent IT supply chain attacks such as the SolarWinds compromise, ransomware campaign that leveraged the Kaseya VSA platform or mass exploitation of the Log4j vulnerabilities have renewed focus on such attacks, which NCC Group says increased by 51% in the last half of 2021. The consulting and managed services firm’s global survey of 1,400 cybersecurity […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 96
  • Page 97
  • Page 98
  • Page 99
  • Page 100
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.