• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

Fortinet Vulnerability, Fortigate

Critical Vulnerability in Java Logging Library Log4j Is Being Actively Exploited

The Java logging library vulnerability is impacting widely used software, with more likely to be affected, security experts say.

December 10, 2021 Zachary Comeau Leave a Comment

Security researchers have discovered a new easy-to-exploit zero-day vulnerability in the ubiquitous Java logging library Apache Log4j 2 that could give attackers the ability to execute unauthenticated remote code execution. The U.S. Cybersecurity and Infrastructure Security Agency, along with dozens of cybersecurity providers, have issued alerts and advisories of the vulnerability, CVE-2021-44228, which they warn […]

Read More

CACI and Yubico Announce Partnership to Enhance Trusted Mobile Platforms

December 9, 2021 TechDecisions Staff Leave a Comment

RESTON, Va.–(BUSINESS WIRE)–CACI International Inc (NYSE: CACI) announced today that it has entered into a partnership with Yubico through a memorandum of understanding that establishes Yubico as the exclusive provider of multi-factor authentication (MFA) solutions in support of CACI’s trusted mobile platforms. Yubico will provide YubiKey 5 FIPS Series products for enhanced security and authentication […]

Read More

IoT Security

Just 42% Of Security Pros Can Detect IoT, OT Vulnerabilities

New research from Microsoft and Ponemon Institute suggests cybersecurity leaders are falling behind when it comes to IoT, OT security.

December 9, 2021 Zachary Comeau Leave a Comment

According to a new Microsoft study in conjunction with the Ponemon Institute, the Internet of Things and new innovations in operational technology is becoming critical for business, but simultaneously increasing an organization’s cyber risk. Researchers surveyed more than 600 IT, cybersecurity and OT security experts across the U.S., and found that many organizations are making […]

Read More

CyCognito Platform Now Available in AWS Marketplace

December 9, 2021 TechDecisions Staff Leave a Comment

Enterprises benefit from simplified procurement and the ability to use AWS spend commitments to purchase CyCognito’s attack surface management and attack surface protection solutions PALO ALTO, Calif.–(BUSINESS WIRE)–#AttackSurface—CyCognito, today announced that its external attack surface management and attack surface protection solutions are now available in AWS Marketplace, a digital catalog with thousands of software listings […]

Read More

CompTIA logo

Test Takers Sought for CompTIA Linux+ Beta Exam

CompTIA's new Linux+ certification exam covers evolving job roles, focuses more on how Linux powers the cloud.

December 8, 2021 TD Staff Leave a Comment

IT professionals with a year or more of on-the- job experience working with Linux servers are invited to serve as beta testers for a new version of the CompTIA Linux+ certification exam, CompTIA, the nonprofit association for the IT industry and workforce. CompTIA Linux+ certification is intended for early career IT professionals who support Linux systems in […]

Read More

Russia Cyberattack

Here’s What The SolarWinds Hackers Have Been Up To

Mandiant offers new details of how the hackers behind the SolarWinds compromise hackers are further compromising the IT supply chain.

December 7, 2021 Zachary Comeau Leave a Comment

It has been nearly a year since a coalition of IT and cybersecurity providers discovered a highly sophisticated Russian-aligned hacking campaign that most notably leveraged IT management software from SolarWinds to conduct espionage on U.S. agencies, tech companies and other high-value organizations. The IT industry has learned a lot since then, including the increasing skill […]

Read More

Crowdstrike Charlotte AI

CISA Selects CrowdStrike to Protect its Endpoints & Workloads

Cybersecurity and Infrastructure Security Agency (CISA) chooses CrowdStrike’s Flacon technology platform to fulfill its mission.

December 7, 2021 TD Staff Leave a Comment

CrowdStrike Inc., a provider of cloud-based endpoint and workload protection, announced the Cybersecurity and Infrastructure Security Agency (CISA) has selected it as one of the major platforms to support the Executive Order endpoint detection and response initiative. CrowdStrike brings cloud-native AI-driven power of the CrowdStrike Falcon platform to secure critical endpoints and workloads for the […]

Read More

New Survey Shows Growing Crisis of Trust with Microsoft and Legacy IT Vendors

December 7, 2021 TechDecisions Staff Leave a Comment

CrowdStrike’s fourth Global Security Attitude Survey reveals 63% of organizations are losing trust in legacy vendors such as Microsoft; 96% of organizations that paid a ransom were hit with additional extortion fees SUNNYVALE, Calif.–(BUSINESS WIRE)–CrowdStrike, Inc. (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced the release of […]

Read More

Arctic Wolf Recognized as Top Managed Detection and Response Product by CRN

December 6, 2021 TechDecisions Staff Leave a Comment

Company continues to lead the market in customer choice for MDR, innovation, market share, channel reach, and technology portfolio EDEN PRAIRIE, Minn.–(BUSINESS WIRE)–#CRNPOTY–Arctic Wolf, a leader in security operations, announced today that CRN®, a brand of The Channel Company, recognized Arctic Wolf® Managed Detection and Response as a winner in its 2021 Product of the […]

Read More

Password Management

More Than 90% Of IT Leaders Reuse Passwords, Survey Shows

New survey sheds light on how recent trends are impacting password management practices among IT leaders and their organizations.

December 6, 2021 Zachary Comeau Leave a Comment

Password security and good credential hygiene are some of the most important components of any organization’s cybersecurity posture, but many are still engaging in risky password practices that threaten their organization’s network security. That’s even true for IT, as 92% of IT decision makers reported reusing passwords across multiple sites—even as cyberattacks escalate due to […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 92
  • Page 93
  • Page 94
  • Page 95
  • Page 96
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.