• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyberattack

Cybersecurity testing, penetration testing, cyber threats

Small Cybersecurity Teams Face Greater Cyber Risk Than Larger Organizations

Cynet survey reveals lack of staff, skills and resources are driving smaller teams to outsource security with advanced tools.

July 14, 2022 TD Staff Leave a Comment

Small security teams face greater risk from attacks than larger enterprises, reveals findings from Cynet, the Boston-based provider of an autonomous, end-to-end, automated extended detection and response (XDR) platform, in it’s second annual CISO Survey of Small Cyber Security Teams report. Smaller security teams are moving towards consolidating security platforms to fewer, more robust and […]

Read More

Survey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises

July 13, 2022 TechDecisions Staff Leave a Comment

Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services BOSTON–(BUSINESS WIRE)–Cynet, the world’s first provider of an autonomous, end-to-end, fully automated extended detection and response (XDR) platform, today announced the results of its second annual “CISO Survey of Small Cyber Security Teams.” […]

Read More

Tenable.ot

Top Cybersecurity and Risk Predictions

Here's what Gartner says every security and risk management leader should build into their security strategies over the next two years.

July 8, 2022 TD Staff Leave a Comment

Gartner’s cybersecurity experts gathered in Sydney last week for Gartner’s Security & Risk Management Summit to discuss what security and risk management leaders need to do to be successful in the digital era. Richard Addiscott, Gartner’s senior director analyst, in a statement, “We can’t fall into old habits and try to treat everything the same […]

Read More

Microsoft Apple macOS bug

Apple to Introduce Lockdown Mode to Help Protect Against Spyware

Lockdown Mode will harden Apple devices and severely limit functionalities of devices that could be exploited by sophisticated spyware,

July 7, 2022 Zachary Comeau Leave a Comment

Apple is previewing Lockdown Mode, a new security capability coming this fall with a slate of new operating systems designed to harden device defenses and severely limit functionalities of devices that could be exploited by sophisticated spyware, such as solutions from NSO Group and other private spyware providers. According to Apple, Lockdown Mode is intended […]

Read More

Cybersecurity Board

Cyber Literacy Test: 7 Questions to Ask Your Board to Reduce Risk and Educate Leaders in the Age of Attacks

Every board of directors is tasked with the responsibility of protecting their corporation’s complete cybersecurity risk profile.

July 7, 2022 Naveen Bhateja Leave a Comment

As corporations consider their cybersecurity weaknesses, the focus often falls on unsecured networks, outdated systems, or a lack of monitoring designed to detect attacks. One area that is rarely identified, but that can significantly threaten a corporation’s ability to prevent, manage, and respond to cyber attacks, is the cyber literacy of the corporation’s board. Every […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

Cybersecurity agencies say organizations should take several steps to secure PowerShell and keep it from being used in cyberattacks.

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

QuSecure’s QuProtect Platform Supports Post-Quantum Cryptography Algorithms Selected by NIST Today for Standardization

July 5, 2022 TechDecisions Staff Leave a Comment

Today’s NIST Standardization Selection Decision, Not Originally Expected Until 2024, Highlights Critical and Urgent Need to Address Future Post-Quantum Cybersecurity Threats Today SAN MATEO, Calif.–(BUSINESS WIRE)–#NIST–QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), today announced its QuProtect™ PQC solution supports all of the post-quantum cryptography algorithms selected by the National Institute of Standards and Technology […]

Read More

BenQ InstaShow WDC30

BenQ Releases InstaShow WDC30 for Most Secure Wireless Presentation

BenQ says its new its new InstaShow WDC30 is its most secure wireless presentation system to date with three layers of protection.

June 29, 2022 TD Staff Leave a Comment

BenQ, the Costa Mesa, Calif.-based provider of visual display solutions, announced its mot secure wireless presentation system to date — the new ultra-secure InstaShow WDC30. It features three layers of wireless protection: Wi-Fi 6 encryption, ISO EAL6+ and FIPS 140-3. BenQ says the InstaShow WDC30 is engineered and certified to meet the security requirements of […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Episode 164: Current and Future Cybersecurity Threats

John Fokker, principal engineer & head of cyber investigations at Trellix, joins the podcast to talk about attack trends on the front lines.

June 23, 2022 Zachary Comeau Leave a Comment

John Fokker, principal engineer & head of cyber investigations at Trellix, joins the podcast to talk about attack trends on the front lines.

Read More

Expel MDR for Kubernetes, cloud

Johnson Controls Acquires Tempered Networks to Boost Cybersecurity

Johnson Controls says the acquisition of Tempered Networks gives the company the ability to provide zero trust security.

June 23, 2022 TD Staff Leave a Comment

Johnson Controls says it has acquired zero trust cybersecurity provider Tempered Networks. Financial terms of the transaction were not disclosed. Based in Seattle, Tempered Networks has created ‘Airwall’ technology, an advanced self-defense system for buildings that is said to enable secure network access across diverse groups of endpoint devices, edge gateways, Cloud platforms and service technicians. It […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Interim pages omitted …
  • Page 65
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.