• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyberattack

health data breaches

Sennheiser Responds After Customer Data from 2018 Was Exposed Online

Audio equipment maker is working to investigate how some customer data was found exposed on the internet two months ago.

December 21, 2021 TD Staff Leave a Comment

Wedemark, Germany-based audio giant Sennheiser is working “intensively” to investigate how some customer data was exposed on the internet two months ago, the company says in a newly updated statement. In a notice on its website, Sennheiser acknowledges being notified in October that some company data was displayed on the web. The company says it […]

Read More

ContraForce Announces $2M Seed Investment from DataTribe

December 21, 2021 TechDecisions Staff Leave a Comment

Cyber Foundry Funds Start-Up With a New Approach to Security and Compliance FULTON, Md.–(BUSINESS WIRE)–DataTribe, a global cyber foundry that invests in and co-builds next-generation cybersecurity and data science companies, announced today a $2M seed investment in ContraForce, a leader in no-code security automation for small and medium-sized businesses. ContraForce delivers a no-code security automation […]

Read More

Three Soft Skills IT Pros Need in 2022 and Beyond

Along with a deep understanding of new and emerging technologies and how to apply them to a business, IT professionals also need the requisite soft skills to survive in this new hybrid work environment.

December 15, 2021 [email protected] Leave a Comment

Along with a deep understanding of new and emerging technologies and how to apply them to a business, IT professionals also need the requisite soft skills to survive in this new hybrid work environment.

Read More

Guardicore Reveals Only 2% of Businesses Use Segmentation to Protect All Mission-Critical Assets Like Applications, Endpoints, Servers and Other Sensitive Data

December 14, 2021 TechDecisions Staff Leave a Comment

New Report Shows Enterprises Deploying Limited Segmentation Strategies Despite 92% of Security Leaders Claiming to Believe the Technology Prevented Cyberattacks from Causing Data Breaches CAMBRIDGE, Mass. & TEL AVIV, Israel–(BUSINESS WIRE)–According to a new report, “State of Segmentation: Strong Implementations Reap Great Security Awards,” 96% of organizations claim to be implementing segmentation in their networks, […]

Read More

Finalists Named in IDC’s Inaugural Best in Future of Trust North America Awards

December 13, 2021 TechDecisions Staff Leave a Comment

Noteworthy initiatives demonstrate transparency, accountability, authenticity, and trustworthiness at scale NEEDHAM, Mass.–(BUSINESS WIRE)–#FutureEnterprise–International Data Corporation (IDC) today announced finalists in the first annual Future Enterprise Best in Future of Trust North America Awards. The new award program recognizes organizations that have maintained Trust amid the evolving needs of its customers. Beyond preventing cyberattacks and ensuring […]

Read More

CISO Burnout

The Great Resignation Is Fueling An Emerging Cybersecurity Risk

Cybersecurity professionals and end users alike are reporting burn out and an increased willingness to skirt security policies.

December 8, 2021 Zachary Comeau Leave a Comment

The effects of the pandemic, leading to what is being called The Great Resignation, is having a severe impact on the global workforce as companies report difficulties finding and retaining talent. However, the same issue is also having an impact on the cybersecurity posture of these organizations, according to a new report from human-centric security […]

Read More

Crowdstrike Charlotte AI

CISA Selects CrowdStrike to Protect its Endpoints & Workloads

Cybersecurity and Infrastructure Security Agency (CISA) chooses CrowdStrike’s Flacon technology platform to fulfill its mission.

December 7, 2021 TD Staff Leave a Comment

CrowdStrike Inc., a provider of cloud-based endpoint and workload protection, announced the Cybersecurity and Infrastructure Security Agency (CISA) has selected it as one of the major platforms to support the Executive Order endpoint detection and response initiative. CrowdStrike brings cloud-native AI-driven power of the CrowdStrike Falcon platform to secure critical endpoints and workloads for the […]

Read More

Arctic Wolf Recognized as Top Managed Detection and Response Product by CRN

December 6, 2021 TechDecisions Staff Leave a Comment

Company continues to lead the market in customer choice for MDR, innovation, market share, channel reach, and technology portfolio EDEN PRAIRIE, Minn.–(BUSINESS WIRE)–#CRNPOTY–Arctic Wolf, a leader in security operations, announced today that CRN®, a brand of The Channel Company, recognized Arctic Wolf® Managed Detection and Response as a winner in its 2021 Product of the […]

Read More

Expel MDR for Kubernetes, cloud

How Collaboration Can Minimize Exposure 

As distributed and remote work continue, IT leaders and tech pros must address risk and ensure security policies and procedures are up to par.  

December 6, 2021 Thomas LaRock Leave a Comment

Cybercrime has reached a new peak with the onslaught of ransomware attacks and data breaches in the last several months. As organizations continue to support distributed and remote work, it’s vital IT leaders and tech pros are appropriately addressing risk and ensuring security policies and procedures are up to par.   SolarWinds recently revealed findings of […]

Read More

Password Management

More Than 90% Of IT Leaders Reuse Passwords, Survey Shows

New survey sheds light on how recent trends are impacting password management practices among IT leaders and their organizations.

December 6, 2021 Zachary Comeau Leave a Comment

Password security and good credential hygiene are some of the most important components of any organization’s cybersecurity posture, but many are still engaging in risky password practices that threaten their organization’s network security. That’s even true for IT, as 92% of IT decision makers reported reusing passwords across multiple sites—even as cyberattacks escalate due to […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Interim pages omitted …
  • Page 65
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.