• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyberattack

IT Considerations M&A, Proofpoint, Illusive

Navigating the IT Considerations of M&A

The IT department and technology leaders play a critical role when acquiring or merging with another organization, CIOs say.

February 14, 2022 Zachary Comeau Leave a Comment

In today’s digital age, when technology drives innovation and serves as a foundational piece of any organization, the IT department is a critical consideration when conducting a merger or an acquisition. Integrating the technology used by each organization is an incredibly important and time-consuming task that requires diligence and deliberate decision-making to ensure that the […]

Read More

Western Digital Comments on Production Status of its Joint Venture Flash Memory Manufacturing Facilities

February 9, 2022 TechDecisions Staff Leave a Comment

SAN JOSE, Calif.–(BUSINESS WIRE)–Western Digital Corp. (Nasdaq: WDC) today announced that contamination of certain material used in its manufacturing processes has occurred and is affecting production operations at both its Yokkaichi and Kitakami joint venture, flash fabrication facilities. Western Digital’s current assessment of the impact is a reduction of its flash availability of at least […]

Read More

Three Technologies Critical to an IT Pro’s Success in 2022 and Beyond

The modern IT professional needs to learn these three critical technologies to help organizations make best use of their technology.

February 9, 2022 [email protected] Leave a Comment

The modern IT professional needs to learn these three critical technologies to help organizations make best use of their technology.

Read More

Cybercriminals Target Linux-based Systems With Ransomware and Cryptojacking Attacks

February 9, 2022 TechDecisions Staff Leave a Comment

VMware report finds more than half of Cobalt Strike users are using the tool illicitly PALO ALTO, Calif.–(BUSINESS WIRE)–As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving […]

Read More

Microsoft Security RSA Conference

Microsoft: MFA Adoption At 22%

Despite an evolving cyberthreat landscape, just 22% of Microsoft Azure Active Directory customers have implemented MFA, passwordless tools.

February 7, 2022 Zachary Comeau Leave a Comment

Despite a cyberthreat landscape that continues to evolve and become even more dangerous, just 22% of Microsoft Azure Active Directory customers have implemented strong identify authentication protection, Microsoft says in a new report. In the company’s Cyber Signals report, a new quarterly cyber threat intelligence brief marketed to IT and security leaders, Microsoft says less […]

Read More

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

February 2, 2022 TechDecisions Staff Leave a Comment

Menlo identified 224% increase in HEAT attacks in the last six months fueling ransomware surge MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–#cloudsecurity—Menlo Security, a leader in cloud security, today announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. HEAT attacks are a class of cyber threats targeting web […]

Read More

Expel MDR for Kubernetes, cloud

Cloud Migration Is a Priority, But Security Concerns Remain

New research from Archive360 finds that most tech executives are heading towards the cloud but require security customizations.

February 1, 2022 Zachary Comeau Leave a Comment

Although fewer than 40% of tech executives store more than half of their legacy app data on the cloud, more than 80% of tech leaders are prioritizing a move to the cloud for their legacy app data over the next 12 months, according to new research from cloud migration software provider Archive360. The company’s survey […]

Read More

SBA Cybersecurity

SBA Announces Cybersecurity Grant Program for New Businesses

State governments can apply for the Cybersecurity for Small Business Pilot Program to help small businesses build their cyber defense system.

January 31, 2022 Zachary Comeau Leave a Comment

The U.S. Small Business Administration has announced a new $3 million program to help emerging small businesses develop their cybersecurity infrastructure. According to the SBA, state governments will be able to compete for grants via the Cybersecurity for Small Business Pilot Program to help small young businesses in their state to build their cyber defense […]

Read More

RGB Spectrum

Video Processors Power Display Technology At Cybersecurity Training Facility

RGB Spectrum's Galileo video processors help visualize data from a variety of sources at a Texas high school cybersecurity training facility.

January 26, 2022 TD Staff Leave a Comment

The North East Independent School District (NEISD) in San Antonio, Texas opened a new cybersecurity training facility in response to increased cyberattacks. The new facility, Institute of CyberSecurity and Innovation (iCSI), trains students on detecting and identifying hacks and cyberattacks and responding to threats. Students from all seven NEISD high schools have access to networking […]

Read More

Insider Risk, Microsoft

Both Negligent and Malicious Insider Cyber Threats Are Increasing

Proofpoint survey shows that cybercriminals are increasingly relying on credential theft while malicious insider threats grow.

January 25, 2022 Zachary Comeau Leave a Comment

For the last two years as organizations adapt with remote work and other effects of the COVID-19 pandemic, cybercriminals have had a field day by exploiting weaknesses in distributed work security and the fact that our attention is elsewhere. That has forced many companies to invest in new technology to harden network defenses from outside […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Interim pages omitted …
  • Page 65
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.