• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

most important cybersecurity training tips

Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees

We highlight the most critical cybersecurity training tips for employees because every business, whether big or small, experiences cyber threats.

August 6, 2019 David Share Leave a Comment

It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threat to a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This means you could probably stand to receive a […]

Read More

IntelliGO

Why IntelliGO, an AI-Cybersecurity Company, Received Recognition Two Years in a Row

IntelliGO Networks has once again received recognition from Gartner Market Guide for their SaaS AI cybersecurity solution.

July 23, 2019 TechDecisions Staff Leave a Comment

IntelliGO Networks Inc., an AI cybersecurity firm, has been recognized in the 2019 Gartner Market Guide for Managed Detection and Response (MDR) Services – an analyst publication aiming to help business leaders determine whether MDR is right for them. This is the second year in a row the firm was listed as a representative vendor for […]

Read More

Defendify cybersecurity platform

Why Investors Put Over a Million into the Defendify Cybersecurity Platform

The Defendify cybersecurity platform just received major backing from investors. Here's what separates it from other solutions on the market.

June 20, 2019 Adam Forziati Leave a Comment

Over half of small businesses in the U.S. said they’ve experienced some kind of cyberattack within the past 12 months, says a Hiscox Cyber Readiness Report. Yet many lack a way to alert, diagnose, and solve these security concerns in a holistic way — and for a reasonable price. Recent funding gained by Defendify, a SaaS-delivered […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

Do you still trust the "Trust but Verify" model of cyber security? These companies don't, and neither should you, says a "Zero Trust Security" proponent.

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

Proofpoint CISO, CISOs cyberattack

Cybersecurity Remains Inadequate Following 2016 Election

Despite the fact that scandals relating to cybersecurity and privacy policy riddled headlines following the presidential election, there has been little federal reform in those realms.

June 18, 2019 Sam Harton Leave a Comment

Despite the fact that scandals relating to cybersecurity and privacy policy riddled headlines following the presidential election, there has been little federal reform in those realms.

Read More

cybersecurity

Girl Power: Women Continue to Be a Growing Force in the Cybersecurity Industry

Statistics and record high attendance at recent Women in CyberSecurity conference indicate an uptick in the number of women in the cybersecurity workforce.

April 24, 2019 Lisa Montgomery Leave a Comment

Statistics and record high attendance at recent Women in CyberSecurity conference indicate an uptick in the number of women in the cybersecurity workforce.

Read More

Even Keyless Cars Have Cybersecurity Problems Now

Weak security systems enable thieves to break into and steal keyless cars.

April 10, 2019 Jessica Messier Leave a Comment

Weak security systems enable thieves to break into and steal keyless cars.

Read More

After a Hack Costs Mexican Banks $20M, Banking Decision Makers Are Tightening Cybersecurity

Mexican banks are learning how to strengthen defenses against cyberattacks, and are ready to ward off future hacks.

April 1, 2019 Jessica Messier Leave a Comment

Mexican banks are learning how to strengthen defenses against cyberattacks, and are ready to ward off future hacks.

Read More

cybersecurity

Twistlock Expands Cloud Native Cybersecurity Platform for Hosts, Containers and Serverless in a Single Product

Latest release of Twistlock adds cloud workload cybersecurity platform for full vulnerability management, compliance, runtime defense, firewalling and granular access control across all hosts in all clouds.

March 18, 2019 Lisa Montgomery Leave a Comment

Latest release of Twistlock adds cloud workload cybersecurity platform for full vulnerability management, compliance, runtime defense, firewalling and granular access control across all hosts in all clouds.

Read More

cybersecurity

Harris Beach Launches Software Company to Address Gaps in Cybersecurity Regulatory Compliance

CyMetric from Harris Beach subsidiary Caetra.io converts cybersecurity and data privacy regulations into measurable policies and controls.

February 27, 2019 Lisa Montgomery Leave a Comment

CyMetric from Harris Beach subsidiary Caetra.io converts cybersecurity and data privacy regulations into measurable policies and controls.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.