• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: data breaches

Cybersecurity testing, penetration testing, cyber threats

This is How Executives and IT Leaders View Cybersecurity Going into 2023

A new Palo Alto Networks cybersecurity study finds that organizations are struggling with talent, zero trust and a growing tech stack.

December 14, 2022 Zachary Comeau Leave a Comment

In addition to an expanded partnership with Google and new attack surface management tools, new innovations to Prisma Cloud and more, Palo Alto Networks this week during its Ignite conference released new research that found that nearly all of 1,300 IT leaders surveyed experienced at least one cyber incident or breach over the last year. […]

Read More

SideChannel Enclave Dashboard screen on laptop

SideChannel Launches Enclave Microsegmentation Platform for SMBs

SideChannel's Enclave microsegmentation platform offers SMBs a solution to simplify and maintain a segmented network with minimal IT administration and maintenance.

September 23, 2022 TD Staff Leave a Comment

SideChannel, the Worcester, Mass.-based provider of cybersecurity services and technology for emerging and middle market companies, announced the launch of Enclave, a microsegmentation software platform. The new platform is designed to offer small and midsize businesses (SMBs) a solution to simplify and maintain a segmented network with minimal IT administration and maintenance. According to SideChannel, […]

Read More

Uber hack, MFA

What IT and Security Teams Should Take Away From the Uber Hack

Cybersecurity experts say the Uber hack demonstrates how attackers are bypassing multi-factor authentication and other security tools.

September 21, 2022 Zachary Comeau Leave a Comment

Uber disclosed late last week that the massive ridesharing company was the target of a cyberattack that resulted in attackers gaining access to the company’s internal systems, including its G-Suite and Slack accounts. This week, Uber has shared more about the hack, including how the attacker was able to bypass security tools. According to Uber, […]

Read More

cybersecurity mesh architecture CSMA, ZTA

Building a Foundation for Zero Trust with Cybersecurity Mesh

A cybersecurity mesh architecture (CSMA) goes beyond ZTA and suggests a deeper, better integrated layer of security.

August 31, 2022 Wes Wright Leave a Comment

It seems like there are more acronyms, labels and methods for bolstering security than ever before – and making sense of them all is proving to be just as complex as the infrastructure they’re meant to secure. One widely embraced term, zero-trust architecture (ZTA), calls for continually vetting users as they access different applications and […]

Read More

Spectrum Enterprise, Cisco

How to Implement a Third-Party Cyber Risk Management Program

CyberGRX explains the importance of implementing a TPCRM program and how your organization can get started, particularly when working with a hybrid workforce.

August 24, 2022 Sarah Frazier Leave a Comment

The COVID-19 pandemic introduced swift digital changes that created further security vulnerabilities for a hybrid workforce. Due to the distributed nature of modern work environments, businesses must be on the lookout for ways that cybercriminals can expose new vulnerabilities. In today’s economy, the need to construct a third-party cyber risk management program  (TPCRM) program for […]

Read More

password manager, Hitachi ID, HYPR, Bravura OneAuth, passwordless

Hitachi ID and HYPR Accelerate Path to Passwordless Future

Hitachi ID's partnership with HYPR has elevated the Bravura Security Fabric, enabling customers to eliminate passwords across critical workflows.

August 22, 2022 TD Staff Leave a Comment

Credentials are the most popular targets of hackers, who are only growing more sophisticated in their ability to automate attacks that bypass traditional forms of multi-factor authentication. Organizations are stuck between having their security teams add increasing complexity in a race to protect credentials and a user experience getting progressively cumbersome. Hitachi ID has partnered […]

Read More

Home Office Cybersecurity security

5 Tech Security Ideas for Creating a Safe Home Office

When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed.

August 2, 2022 Kate Jones Leave a Comment

Working from home can create a great sense of freedom and flexibility, but it comes with its challenges. When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed for optimal protection. Should someone hack into your home office or Wi-Fi network, your computer and […]

Read More

Xarios, Real-Time Call Analytics, Audian, internal tools

Study: Tech Teams Spend a Third of Their Time Building Internal Tools

Retool's 2022 State of Internal Tools Report reveals engineers are spending a third of their time building and maintaining internal tools.

July 20, 2022 TD Staff Leave a Comment

Technical teams are spending a lot of time on internal tools; in fact, an average of 33% of their time, according to latest research from Retool, who surveyed 2,000+ people who have built internal tools to learn more about how they build and maintain these tools, as well as how the process has changed over […]

Read More

CrowdStrike Falcon Pro for Mac Achieves 100% Malware Protection, Wins Fifth AV-Comparatives Approved Mac Security Product Award

June 28, 2022 TechDecisions Staff Leave a Comment

Award validates CrowdStrike’s industry leadership in proactively protecting customers against today’s most advanced attacks AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced CrowdStrike Falcon Pro for Mac has won a fifth consecutive Approved Security Product award from leading independent testing organization AV-Comparatives, achieving the […]

Read More

Password Manager, login stress, passwordless authentication

Research: Remote End Users, Contractors Need Password Better Management Tools

Bitwarden survey reveals that while enterprises are taking password security more seriously, password managers can be better utilized.

June 21, 2022 Zachary Comeau Leave a Comment

New research suggests that strong passwords remain a cybersecurity priority, but the adoption of strong password policies continues to fall short. According to the research from password management company Bitwarden, nearly enterprise IT decision makers are familiar with one-time passwords, email or SMS verification codes, biometrics and other passwordless authenticators, but 55% of global organizations […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.