• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

Media Alert: Intel at Black Hat 2021 and DEF CON 29

July 28, 2021 TechDecisions Staff Leave a Comment

Intel experts present talks and take part in panel discussions at this year’s Black Hat USA 2021, DEF CON 29 and BSides events SANTA CLARA, Calif.–(BUSINESS WIRE)–Join Intel experts for panel discussions and talks at this year’s Black Hat USA 2021, DEF CON 29 and BSides Las Vegas, taking place virtually and in Las Vegas […]

Read More

CVP Awarded $84M DHS USCIS SPEED Contract to Provide DevSecOps and Human Centered Design Services

July 28, 2021 TechDecisions Staff Leave a Comment

FAIRFAX, Va.–(BUSINESS WIRE)–#CVPcorp—Customer Value Partners, Inc. (CVP), a business and technology consulting firm that helps organizations prepare for a culture of Continuous Change, has been awarded the $84 million Services for Product Engineering and Enterprise Delivery (SPEED) contract by the Department of Homeland Security (DHS) U.S. Citizenship and Immigration Services (USCIS) to provide DevSecOps, user-centered […]

Read More

Exploited Vulnerabilities

Patch These Heavily Exploited Vulnerabilities Now

Vulnerabilities in Citrix, Pulse, Microsoft and Fortinet products are among the most commonly exploited, according to federal agencies.

July 28, 2021 Zachary Comeau Leave a Comment

When a vendor or security researcher discloses a vulnerability in an IT product, organizations should be quick to apply the patch or implement a secure workaround to protect networks from bad actors that are quick to exploit that vulnerability. When those vulnerabilities are in widely used products from popular vendors like Citrix, Pulse, Microsoft and […]

Read More

XSOC CORP’s SOCKET Receives UL- 2900 Certification for Securing Encrypted Workflows of Today’s Enterprise and Industrial Connected Devices

July 28, 2021 TechDecisions Staff Leave a Comment

Symmetric key transport product now ready for immediate integration and deployment IRVINE, Calif.–(BUSINESS WIRE)–XSOC CORP today announces that its symmetric key exchange product, SOCKET, has received UL 2900-1 Certification. The rapid and secure “exchange” of symmetric encryption keys is the most critical component of the decryption process when utilizing symmetric encryption to secure data. SOCKET […]

Read More

1 in 3 Organizations Experiencing More Cyberattacks This Year, Says New ISACA Study

July 27, 2021 TechDecisions Staff Leave a Comment

SCHAUMBURG, Ill.–(BUSINESS WIRE)–Ransomware attacks have been increasingly in the headlines—and reaching historic levels of impact with the recent Colonial Pipeline and Kaseya attacks. Findings from the State of Cybersecurity 2021, Part 2 survey report from ISACA in partnership with HCL Technologies show that 35 percent of respondents report that their enterprises are experiencing more cyberattacks, […]

Read More

University of San Diego Health Substitute Notice of Data Breach

July 27, 2021 TechDecisions Staff Leave a Comment

SAN DIEGO–(BUSINESS WIRE)–UC San Diego Health recently experienced a security event involving unauthorized access to some employee email accounts. This notice provides up-to-date information on what happened and what we are doing. What Happened? UC San Diego Health recently identified and responded to a security matter involving unauthorized access to some employee email accounts. At […]

Read More

SpecterOps Launches BloodHound Enterprise to Improve Active Directory Security for the Enterprise

July 27, 2021 TechDecisions Staff Leave a Comment

New Attack Path Management solution from the creators of the open-source tool BloodHound enables organizations to quickly eliminate and manage critical Active Directory Attack Paths SEATTLE–(BUSINESS WIRE)–SpecterOps, a provider of adversary-focused cybersecurity solutions and the creators of the free and open-source penetration testing tool BloodHound, today announced BloodHound Enterprise, an Attack Path Management (APM) security […]

Read More

Exabeam Announces Support of FirstBoard.io to Increase Women Leaders on Technology Boards

July 27, 2021 TechDecisions Staff Leave a Comment

Exabeam CMO Sherry Lowe is among the founding members working to establish greater diversity and inclusion in C-suites and boardrooms FOSTER CITY, Calif.–(BUSINESS WIRE)–#Exabeam—Exabeam, the security analytics and automation company, today announced its support of FirstBoard.io, a curated network of highly qualified and diverse technology leaders seeking corporate director roles. “Having industry-leading companies like Exabeam […]

Read More

Radiant Logic Selected to Participate in NIST’s NCCoE Zero Trust Architecture

July 27, 2021 TechDecisions Staff Leave a Comment

A robust identity architecture is at the core of the Zero Trust Initiative NOVATO, Calif.–(BUSINESS WIRE)–#NCCOE–Radiant Logic, the identity unification pioneer, is pleased to announce that it has been selected by the National Institute of Standards and Technology (NIST)‘s National Cybersecurity Center of Excellence (NCCoE) to contribute critical identity capabilities to their new Zero Trust […]

Read More

No More Ransom

Check This Resource Out Before Paying a Ransom Or Restoring Data

No More Ransom is an international initiative designed to help organizations avoid paying a ransom by making decryption tools available.

July 26, 2021 Zachary Comeau Leave a Comment

When your computer systems are infected with ransomware, you may think you only have two options: pay to (maybe) have all your data decrypted by the hackers or start the long and arduous process of restoring everything. Those two options have their pros and cons. Paying the ransom can be a quick fix, but it’s […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 121
  • Page 122
  • Page 123
  • Page 124
  • Page 125
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.