• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

Log4j, Older Vulnerabilities, CISA KEV

Expect ‘Headline-grabbing’ Log4j Attacks in 2023

Log4j bug will continue to be a critical issue for IT professionals in 2023, according to GreyNoise.

January 4, 2023 Zachary Comeau Leave a Comment

Organizations should expect to see continued cyberattacks leveraging the Log4Shell vulnerability in 2023, cybersecurity company GreyNoise Intelligence says in a new report. The Washington, D.C.-based internet scanning traffic analysis firm’s recently released report, the 2022 Mass Exploitation Report, dives deep into the most significant threat detection events of the past year, including touching on CISA’s […]

Read More

Top IT stories 2022

Our Top IT Stories From 2022

Hybrid work, cybersecurity, cloud computing, recession, and new products and services highlight this year's top IT stories.

December 29, 2022 Zachary Comeau Leave a Comment

2022 was a very busy year for IT professionals as they grappled with new trends, technologies, tools, workplace models, cyberattacks and more while they helped their organization remain productive and secure. We looked back at our coverage to find common trends in our content to bring you our top 10 stories from this past year.  […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

This Guide Can Help Small Businesses Secure Their Cloud Environments

The Australian Cyber Security Center worked with Microsoft to develop the Small Business Cloud Security Guides to help secure SMBs.

December 29, 2022 Zachary Comeau Leave a Comment

For small businesses, securing IT systems can be a challenge. From finding qualified IT talent and then paying for their salary and security tools, cybersecurity can be costly for a small business. Hackers know this, and this makes small businesses a prime target for cyberattacks. With more and more small businesses leveraging the easy-to-deploy cloud […]

Read More

Royal Ransomware

Phishing, Ransomware Continue to Dominate as Cyberattacks Surge in 2022

Acronis' year-end report finds that ransomware, phishing and unpatched bugs remain top threats as cybercriminals adapt.

December 28, 2022 Zachary Comeau Leave a Comment

Phishing, MFA fatigue attacks are on the rise, and the cost of a data breach is now expected to reach $5 million, according to a year-end cyberthreat report from cybersecurity firm Acronis. The Switzerland-based firm’s report from its Cyber Protection Operation Center provides an in-depth analysis of the cyberthreat landscape including ransomware, phishing, malicious websites, […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: Botnet, Google Chrome, Okta’s GitHub Hacked, ChatGPT

New botnet capabilities, an updated Google Chrome release schedule, an Okta security incident and more ChatGPT highlight this week's IT news.

December 22, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology news stories each week. Microsoft discovers new botnet capabilities Microsoft […]

Read More

FBI search engine ads, tablet, Gartner, worldwide device shipments

FBI: Beware of Search Engine Ads

Cybercriminals are using search engine ads to deploy malware and steal credentials, FBI says in new warning.

December 21, 2022 Zachary Comeau Leave a Comment

The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]

Read More

SASE, SASE approaches, SASE implementation

Axonius Updates SaaS Management Offering

Axonius' latest updates further enhance the comprehensive visibility and correlation across SaaS apps, devices and users, streamlining efforts to reduce organizations’ attack surface.

December 20, 2022 TD Staff Leave a Comment

Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]

Read More

Metaverse Security

The Metaverse Presents Opportunity, but Also Security Risks

The metaverse is emerging as a valuable new business and consumer tool, but it also comes with a new set of security concerns.

December 20, 2022 Zachary Comeau Leave a Comment

The metaverse is emerging as a new technology that both consumers and businesses see as valuable for communication, collaboration, enhanced services, entertainment and real estate, but those hopes also come with the same security concerns any IT professionals have about a new technology. Nearly 70% of organizations are planning to do business in the metaverse […]

Read More

The executive hands prevent the employee from receiving and opening a spam mail, the concept of information security in companies, data protection on the internet

Phishing Scams: 5 Tips on Training Employees

Five things enterprises can incorporate into their security awareness program to cut down on human risk.

December 19, 2022 Roy Zur Leave a Comment

Phishing attacks have been around for just about as long as email, yet employees still regularly fall for them. According to the U.S. Federal Bureau of Investigation, roughly 90% of data breaches occur on account of phishing and those attacks have increased approximately 400% since the start of the COVID-19 pandemic. Assessing and reacting to […]

Read More

NSA Programming Languages

How To Protect Your Organization from Cyberattacks Before The Holidays

IT and security pros should take extra steps to protect their organization from cyberattacks this holiday season, White House, CISA urge.

December 19, 2022 Zachary Comeau Leave a Comment

Editor’s note: This article was originally published last year, but the main points are still relevant today as we head into another holiday break. Review these tips and recommendations to keep your organization safe and secure this year.  With the holidays approaching, federal officials are again warning organizations of all sizes to be on the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.