• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

iOS macOS vulnerabilities

Qualcomm Secures Important Precedent and $31 Million In Legal Victory Against Apple

In a heated and drawn-out legal battle between the two tech giants, a jury determined that Apple violated Qualcomm patents.

April 10, 2019 Sam Harton Leave a Comment

In a heated and drawn-out legal battle between the two tech giants, a jury determined that Apple violated Qualcomm patents.

Read More

Equifax Data Breach Could Have Been Avoided

A Senate subcommittee found that Equifax failed to comply with standard cybersecurity measures that should be taken to protect customer information.

March 28, 2019 Sam Harton Leave a Comment

A Senate subcommittee found that Equifax failed to comply with standard cybersecurity measures that should be taken to protect customer information.

Read More

Phishing

When Its Worth It to Pay Up in Some Ransomware Attacks

If Jackson County had not paid its hackers their ransom, it would have wasted workers’ time and more money before getting back to business as usual.

March 25, 2019 Jessica Messier Leave a Comment

If Jackson County had not paid its hackers their ransom, it would have wasted workers’ time and more money before getting back to business as usual.

Read More

Hacking

North Korea Continues to Launch Aggressive Cyberattacks

Despite the fact that they have stepped down regarding nuclear weapons, cyber attacks on Western entities remain a dangerous staple in North Korea’s military strategy.

March 21, 2019 Sam Harton Leave a Comment

Despite the fact that they have stepped down regarding nuclear weapons, cyber attacks on Western entities remain a dangerous staple in North Korea’s military strategy.

Read More

Honeywell

Looking for New Software, Apps, and Other Enterprise Tech? Check Out Honeywell Marketplace

Honeywell Marketplace provides customers with direct access to discovering and purchasing Honeywell and third-party enterprise mobile apps.

March 14, 2019 Lisa Montgomery Leave a Comment

Honeywell Marketplace provides customers with direct access to discovering and purchasing Honeywell and third-party enterprise mobile apps.

Read More

The Opportunity of Visual Network Platforms in Enterprise

Visual networking platforms offer an opportunity to unlock new levels of productivity and efficiency for enterprise-level communications.

March 7, 2019 John Marshall Leave a Comment

Visual networking platforms offer an opportunity to unlock new levels of productivity and efficiency for enterprise-level communications.

Read More

What Decision Makers Need to Know About Faulty Android Antivirus Apps

A recent test shows that most of them are a sham, and don’t protect users against viruses as advertised.

March 3, 2019 Jessica Messier Leave a Comment

A recent test shows that most of them are a sham, and don’t protect users against viruses as advertised.

Read More

Week in Review: POL, Digital Signage Trends, Google Fined, Etc.

This week, February 25th-March 1st, 2019: Passive Optical LAN growth accelerates, digital signage trends in 2019, Google fined for GDPR violations, and more.

March 1, 2019 TechDecisions Staff Leave a Comment

This week, February 25th-March 1st, 2019: Passive Optical LAN growth accelerates, digital signage trends in 2019, Google fined for GDPR violations, and more.

Read More

NTT Predictions, Phygital

Trump to Sign Executive Order to Keep Chinese Tech Out of US Networks

Entering the age of 5G cautiously, the Trump administration wants to limit Chinese control over American wireless networks and beef up cybersecurity efforts.

February 28, 2019 Sam Harton Leave a Comment

Entering the age of 5G cautiously, the Trump administration wants to limit Chinese control over American wireless networks and beef up cybersecurity efforts.

Read More

Proofpoint CISO, CISOs cyberattack

Assess Your Cyber Risks and Vulnerabilities

Your organization may be vulnerable to cyber risks as a result of systems being installed on or adjacent to the network. Here are some considerations for assessing cyber risks.

February 27, 2019 Paul Konikowski Leave a Comment

Most of these vulns can be patched by updating the firmware, securing the network, and/or enabling the passwords on the devices. But uncovering and patching these device vulnerabilities is only one aspect of securing AV installations.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 147
  • Page 148
  • Page 149
  • Page 150
  • Page 151
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.