• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyberattack

Metaverse Cybersecurity

Interested in the Metaverse? Prioritize Cybersecurity, Microsoft Says.

Microsoft's EVP of security, compliance, identity and management urges organizations to prioritize the cybersecurity of the metaverse.

March 30, 2022 Zachary Comeau Leave a Comment

As Big Tech firms begin to dive head first into the metaverse, Microsoft is urging the industry to make cybersecurity a priority and establish core security principles before the emerging technology becomes too advanced and vulnerable to exploitation. In a blog post, Charlie Bell, the company’s executive vice president of security, compliance, identity and management, […]

Read More

Trellix and CSIS Find Organizations Outmatched by Nation-State Cyber Threat Actors

March 28, 2022 TechDecisions Staff Leave a Comment

Report Highlights Increased Government Support Required to Defend Against Sophisticated Nation-States NEWS HIGHLIGHTS 86 percent of respondents believe they have been targeted by a cyberattack conducted by a group acting on behalf of a nation-state Only 27 percent of respondents said they have complete confidence in the ability of their organization to differentiate between nation-state […]

Read More

McAfee ransomware attack

51% of Small Businesses Don’t Have Cybersecurity Measures in Place

Despite the negative consequences, small business owners believe they are too small to be targeted for cyberattacks.

March 25, 2022 TD Staff Leave a Comment

According to a new study, a majority of small businesses have no protection against cyberattacks, suggesting that businesses and their consumers are vulnerable to hacking and identity theft. A study from Digital.com, an independent website for small business online tools, products and services, revealed that 51% of small businesses do not have protection against cyberattacks. […]

Read More

C3.ai Digital Transformation Institute Announces Research Awards for AI to Transform Cybersecurity and Secure Critical Infrastructure

March 24, 2022 TechDecisions Staff Leave a Comment

URBANA, Ill. & BERKELEY, Calif.–(BUSINESS WIRE)–C3.ai Digital Transformation Institute (C3.ai DTI) today announced the third round of C3.ai DTI funded advanced research awards, focused on using artificial intelligence (AI) to harden information security and secure critical infrastructure. The Institute awarded a total of $6.5 million in cash awards to leading research scientists at University of […]

Read More

Zero Trust, Leostream, AWS

Zscaler Introduces Advanced Zero Trust Solutions to Minimize Attack Surface, Prevent Lateral Movement

Zscaler is launching three new zero trust network access innovations designed to replace legacy firewalls and VPNs.

March 23, 2022 Zachary Comeau Leave a Comment

Cloud security provider Zscaler is launching what it says are three industry-first zero trust network access innovations designed to replace legacy firewalls and VPNs delivered as part of the company’s Zero Trust Exchange. According to the company, the offerings — private app protection, integrated deception and privileged remote access for industrial IoT and OT systems […]

Read More

Styra Report Finds Rapid Cloud-Native and Open-Source Adoption is Shifting Security Responsibilities Across Teams

March 23, 2022 TechDecisions Staff Leave a Comment

Study from the creators and maintainers of Open Policy Agent provides insight into how an increase in cloud-native and open-source adoption is driving security prioritization at organizations but also leading to ownership misalignment among teams REDWOOD CITY, Calif.–(BUSINESS WIRE)–Styra, Inc., the creators and maintainers of Open Policy Agent (OPA) and leader of cloud-native authorization, today […]

Read More

Cloudflare and CrowdStrike Expand Partnership to Bring Integrated Zero Trust Security to Devices, Applications and Networks

March 17, 2022 TechDecisions Staff Leave a Comment

Two leading cybersecurity companies join forces to make it easier than ever for businesses to deploy seamless Zero Trust protection from the network to the device SAN FRANCISCO & AUSTIN, Texas–(BUSINESS WIRE)–Cloudflare, Inc. (NYSE: NET), the security, performance, and reliability company helping to build a better Internet, today announced it is expanding its partnership with […]

Read More

Kubernetes an Achilles Heel in Defense Against Ransomware Attacks

March 16, 2022 TechDecisions Staff Leave a Comment

Research reveals 89% of organizations say ransomware attacks in Kubernetes environments are a risk, yet they are dangerously slow to extend data protection solutions SANTA CLARA, Calif.–(BUSINESS WIRE)–Veritas Technologies, a leader in multi-cloud data management, today announced the results of a new study revealing that the majority of organizations are underprepared to face threats against […]

Read More

ElectroNeek Gained SOC 2 TYPE II Updating TYPE I Status That Had Previously Been

March 15, 2022 TechDecisions Staff Leave a Comment

AUSTIN, Texas–(BUSINESS WIRE)–#ElectroNeek—ElectroNeek, the only Hyperautomation platform for MSPs & IT Service Providers, today announced that the company has successfully passed SOC 2 TYPE II audit. There are two main types of SOC reports – TYPE I tackles whether a vendor can meet the relevant trust principles at a specific date. While TYPE II goes […]

Read More

SBOMs

What Needs To Be In An SBOM?

With cybercriminals increasingly leveraging the software supply chain, SBOMs are becoming an important tool. This is what they need to include.

March 15, 2022 Zachary Comeau Leave a Comment

When alleged Russian hackers compromised the SolarWinds Orion platform to spy on U.S. agencies and other high-profile entities, the tech industry renewed its call for the adoption of software bills of materials (SBOM) — an inventory of components that make up the final product. Advocates say that will help give IT and cybersecurity professionals the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 65
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.