• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

New Report Surveys Hackers to Learn Best and Worst Countermeasures

Nuix polled 70 hackers at DEFCON 2016 in Las Vegas to learn which countermeasures are stopping them from compromising systems and which are letting them in. The results are surprising.

February 28, 2017 TechDecisions Staff Leave a Comment

At the annual DEFCON 2016 in Las Vegas last year, Chris Pogue, CISO of Nuix managed to gather a room full of hackers together and handed them a paper survey. The intent? To help CISOs, CSOs and enterprise security teams understand which security countermeasures really do have an impact and which do not. The results […]

Read More

15 Products Win Top New Technology (TNT) @ ISE Award

The second annual Top New Technology @ ISE awards were announced this week at the show. Read on for the 15 commercial category winners.

February 12, 2017 TechDecisions Staff Leave a Comment

n recognition of new and outstanding products and services being exhibited at the Integrated Systems Europe (ISE) show in Amsterdam, CE Pro, Commercial Integrator, Essential Install, and TechDecisions are pleased to announce the winners of the 2nd annual 2017 Top New Technology (TNT) Awards @ ISE. Tech Decisions and its sister publications worked with a team […]

Read More

Cyber Attack

How Does a Cyber Attack Work?

Hacking and cyber attacks are threats that should concern every company. Here's how they work.

January 17, 2017 Colleen Frye Leave a Comment

You work in the financial department of your company and you just got an email from a C-level executive. It tells you to pay an invoice of $78,000 before 1 p.m., and includes instructions for how to wire the money to your vendor’s bank. You send the money, as requested, and it quickly moves to […]

Read More

What is Cyber Security?

Infographic from GTreasury attempts to shed some light on the terms and issues around cyber security.

January 3, 2017 TechDecisions Staff Leave a Comment

What is cyber security? That’s the question that GTreasury, a company that offers a Treasury Management System (TMS), attempts to answer in a recent infographic. First, a primer on what some of the terms surrounding cyber security mean: Spam is electronic junk mail. The term refers to unsolicited, and often times unwanted, email. Spear Phishing […]

Read More

Commercial Business Leaders Are Missing Key BYOD Ingredients

BYOD has long been a hassle for business leaders. Without the right ingredients, it will remain so.

December 15, 2016 Neal Serrano Leave a Comment

By now, most commercial business leaders are fully aware of the benefits that come with integrating a bring-your-own-device (BYOD) policy into their organizational strategy. By enabling employees to utilize their own connected devices to accomplish their daily tasks, businesses can reduce reliance on expensive infrastructure, improve worker mobility and streamline communications processes. The benefits are […]

Read More

How Will President Trump Deal With Cyber Security?

Now that the presidential election is over, how will President Elect Donald Trump deal with cybersecurity.

November 13, 2016 Keith Lowry and Chris Pogue Leave a Comment

It’s finally over! A long, contentious, and tumultuous Presidential election is finally behind us. While both candidates have, at some point, touched upon the concept of cybersecurity—Mrs. Clinton and the widely publicized email server on one hand, Mr. Trump and his calls for Russian hackers on the other—neither candidate laid out a comprehensive plan for […]

Read More

Everything You Need to Know About the Dyn DDoS Cyberattack

The cyberattack on DNS provider Dyn created outages on sites as massive as Twitter and Amazon. What happened?

November 8, 2016 Jonathan Blackwood Leave a Comment

If you’ve been on the internet in the past few weeks you’ve heard about the large scale cyberattack on DNS provider Dyn. On October 21, major websites including Twitter, Amazon, Spotify, Reddit, PayPal, Airbnb, Wired, Pinterest, and more experienced outages. The common thread? Each of these sites used Dyn as their upstream DNS provider. A […]

Read More

Cyber Security locks digital

Network Security Policy Management Arrives at the Speed of Cloud

Tools for NSPM offer services for organizations to help manage policies for firewalls, workflows, audits and more.

October 17, 2016 Ruvi Kitov Leave a Comment

Graduating from its unsung hero position among contending cybersecurity disciplines, network security policy management (NSPM) has shifted towards the role of team MVP. Gartner recently gave NSPM a benefit rating of ‘high’ in its most recent “Hype Cycle for Infrastructure Protection” report, as these tools have been known to not only reduce costs, but increase revenue […]

Read More

Interview: AT&T’s John Irwin Talks Cyber Security at Colleges and Universities

Hackers target universities and colleges for a number of reasons, including network security strength and the data of research and students. Learn more about how to keep data safe on campuses.

September 28, 2016 TechDecisions Staff Leave a Comment

TechDecisions sat down with John Irwin, Senior Vice President of Government, Education and Healthcare at AT&T, to talk about cyber security considerations for colleges and universities: TD: Why would someone want to steal data from a college or university? JI: If you think about colleges and universities, they host a large amounts of student and […]

Read More

Welcome to TechDecisions

September 8, 2016 Danielle Frappier Leave a Comment

In the digital age, organizations from enterprise to education are utilizing technology in new and exciting ways. TechDecisions helps you better understand how to implement the right technology. We cover all kinds of tech you need to install: IT: Networking, Cybersecurity, Unified Communications, Cloud, Data and Analytics, Storage and Backup, Mobility and BYOD, VoIP, PoE, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 159
  • Page 160
  • Page 161
  • Page 162
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.