• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

ERI’s John Shegerian Describes the Critical Importance of ESG Initiatives Across All Industries at ISRI Convention & Exposition 2022

March 30, 2022 TechDecisions Staff Leave a Comment

LAS VEGAS–(BUSINESS WIRE)–#ERI–John Shegerian, Chairman/CEO of ERI, the nation’s leading fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company, was a featured panelist last week at the ISRI Convention & Exposition in Las Vegas. Considered the voice of the recycling industry, promoting safe, economically sustainable and environmentally responsible recycling through networking, […]

Read More

FBI Special Agent & the CISO of Miami to Deliver Keynotes at The Official Cyber Security Summit of Miami

March 30, 2022 TechDecisions Staff Leave a Comment

Gathering of Leading C-Suite Executives and Information Security Experts to Explore Emerging Trends in Cyber Security Threats NEW YORK–(BUSINESS WIRE)–#cyber—The Official Cyber Security Summit in Miami on April 7, 2022 invites in-person attendees to participate in an opening security briefing from the Federal Bureau of Investigation (FBI)’s Private Sector Coordinator for the Miami Division, Special […]

Read More

MetricStream Enables Customers to Quantify Risks in Monetary Terms, Identify Cloud Risks Faster, and Accurately Report Climate-related Financial Metrics

March 30, 2022 TechDecisions Staff Leave a Comment

SAN JOSE, Calif.–(BUSINESS WIRE)–#grc–MetricStream, the global market leader in integrated risk management (IRM) and governance, risk, and compliance (GRC), today announced its latest product release, Danube, designed to enable customers to successfully navigate an increasingly connected GRC world. The Danube release includes advanced risk quantification, automated compliance across cloud environments, and support for the Task […]

Read More

Breezeline Launches “WiFi Your WayTM” for Business

March 30, 2022 TechDecisions Staff Leave a Comment

Next-gen technology delivers powerful managed WiFi experience for businesses QUINCY, Mass.–(BUSINESS WIRE)–Breezeline, the eighth-largest cable operator in the U.S., today announced that it has launched WiFi Your WayTM for Business, a premium, managed WiFi solution that provides expanded WiFi coverage, superfast speed and enhanced reliability for small- and medium-sized businesses. The service makes use of […]

Read More

Log4Shell, Log4j, CVE-2021-44228

VMware Horizon Servers Still Under Log4Shell Attacks

Hackers are still using the Log4Shell exploit to attack VMware Horizon servers and deploy cryptominers and backdoors, according to Sophos.

March 29, 2022 Zachary Comeau Leave a Comment

Hackers are continuing to leverage the Log4Shell vulnerability to attack VMware Horizon servers and deploy cryptocurrency mining malware and backdoors, with a large wave of such attacks from mid-January still ongoing, according to cybersecurity firm Sophos. In a new report, Sophos says the attempts to leverage Horizon continued and grew in number throughout January and […]

Read More

Crestron DM NVX

Crestron’s DM NVX AV-over-IP Line Receives IT Security Certifications

Crestron's DM NVX solutions are now certified by the NIAP, certifying that the products meet cybersecurity standards.

March 29, 2022 Zachary Comeau Leave a Comment

Workplace technology maker Crestron says its line of DM NVX AV-over-IP solutions are now certified by the National Information Assurance Partnership (NIAP) and the U.S. government’s Common Criteria, certifying that the products meet cybersecurity standards. The designations open up new avenues for the DM NVX products in U.S. government agencies, including federal civilian agencies and […]

Read More

Etisalat UAE, from e& Deploys Netcracker Edge Orchestration to Offer Advanced Private 5G Services

March 29, 2022 TechDecisions Staff Leave a Comment

Solution Combines Edge Cloud Applications with 5G to Bring New Value to Vertical Markets WALTHAM, Mass. & ABU DHABI, United Arab Emirates–(BUSINESS WIRE)–Netcracker and NEC Corporation announced today that e& (formerly known as Etisalat Group) has deployed Netcracker Edge Orchestration to innovate with 5G and new edge services in vertical markets. Etisalat UAE, from e& […]

Read More

LogicHub Launches Free SOAR Edition of its Advanced Automation Platform

March 29, 2022 TechDecisions Staff Leave a Comment

Unique free platform offering enables organizations of all sizes to improve SOC security by automating repetitive tasks and eliminating hours of manual work MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–#SOAR–Leading security orchestration, automation, and response (SOAR) and managed detection and response (MDR) provider LogicHub today announced the availability of the LogicHub Free SOAR Edition of its award-winning automation […]

Read More

CRN® Honors Adlumin With 5-Star Rating in 2022 Partner Program Guide

March 28, 2022 TechDecisions Staff Leave a Comment

The company’s partner program has been rated 5-stars by CRN®, highlighting the company’s successful journey within the channel community WASHINGTON–(BUSINESS WIRE)–#5starrating–Today, Adlumin, the command center for security operations, announced that its partner program is being honored by CRN®, a brand of The Channel Company, with a prestigious 5-star rating in its 2022 Partner Program Guide. […]

Read More

CISA Software Security

CISA Adds 66 CVEs to Known Exploited Vulnerabilities List

The majority of the new additions to CISA's list of known exploited vulnerabilities are several years old, including 8 from 2010 or earlier.

March 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added 66 software security bugs that are being actively exploited to its database of known exploited vulnerabilities, including some from leading technology vendors that date back several years. For the majority of the products implicated in the new additions, there are patches available to remediate the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 71
  • Page 72
  • Page 73
  • Page 74
  • Page 75
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.