• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

Progress MOVEit vulnerability

Yes, Ransomware Attacks Are Increasing At An Alarming Rate

Ransomware attacks have increased 151% over the first half of 2021, according to a new report from SonicWall.

August 3, 2021 Zachary Comeau Leave a Comment

Ransomware and other cyberattacks have been front and center in news cycles of late, but is the issue just getting more attention, thus the renewed emphasis on stopping it? That answer is an emphatic ‘no,’ according to SonicWall, which says in a new report that ransomware attacks skyrocketed in the first half of 2021, surpassing […]

Read More

GoSecure Announces Enhanced Managed Detection and Response Portal

August 3, 2021 TechDecisions Staff Leave a Comment

MDR portal provides unprecedented visibility for GoSecure Titan customers LA JOLLA, Calif.–(BUSINESS WIRE)–#cybersecurity–GoSecure, a leading provider of Managed Detection and Response (MDR) services, today announced the release of their enhanced MDR portal. As organizations increase their reliance on managed security, they still expect complete visibility into the service provided. The GoSecure Titan MDR portal delivers […]

Read More

McAfee Enterprise Introduces Industry Leading Comprehensive, Data-Centric Solution to Secure Private Applications

August 3, 2021 TechDecisions Staff Leave a Comment

MVISION Private Access provides ‘Zero Trust’ unified protection, fast direct-to-app access and 99.999% availability to private applications SAN JOSE, Calif.–(BUSINESS WIRE)–McAfee Enterprise today announced MVISION Private Access, an integrated approach to enable granular ‘Zero Trust’ access and extend data and threat protection capabilities to private applications hosted across hybrid IT environments. Many organizations are extending […]

Read More

Phishing

Microsoft Warns of Sneaky Phishing Campaign

August 2, 2021 Zachary Comeau Leave a Comment

Microsoft is warning of an active phishing campaign that uses a combination of techniques to evade detection and trick users into giving up their credentials. In a series of Tweets and updates on GitHub, Microsoft’s security team says the active phishing campaign uses a “craft combination” of legitimate-looking original sender email addresses, spoofed display sender […]

Read More

U.S. Enterprises Seek Help from Cybersecurity Vendors to Fend Off Attacks

August 2, 2021 TechDecisions Staff Leave a Comment

ISG Provider Lens™ report finds many cybersecurity vendors forming partnerships to provide the best defenses STAMFORD, Conn.–(BUSINESS WIRE)–$III #CISO–Enterprises in the U.S. are turning to cybersecurity providers offering best-of-breed technologies that can help them fend off cyberattacks from sophisticated criminals, according to a new report published today by Information Services Group (ISG) (Nasdaq: III), a […]

Read More

NSA Programming Languages

Make Cybersecurity Part Of Your Power Management Lesson Plan

IT infrastructure and cyber security considerations for protecting power devices from potential cyberattacks.

July 29, 2021 Hervé Tardy Leave a Comment

IT infrastructure and cyber security considerations for protecting power devices from potential cyberattacks.

Read More

Beyond Identity

What You Can Learn From Twitter Users’ Awful 2FA Adoption

Most Twitter users don't use 2FA, and the ones that do overwhelmingly use the least secure method. Don't let your users make that mistake.

July 23, 2021 Zachary Comeau Leave a Comment

Two-factor authentication or multi-factor authentication – although not the end all be all to account security – have emerged as an effective way of safeguarding sensitive accounts since an attacker would need access to an email address, mobile phone or authenticator app in addition to your credentials. With several notable high-profile Twitter accounts being compromised […]

Read More

Royal Ransomware

Kaseya Obtains Universal Decryption Key

Kaseya says the universal decryption key is effective as recovering locked data, but how it appeared is a secret.

July 23, 2021 Zachary Comeau Leave a Comment

Kaseya, the IT management software company that was leveraged by the REvil ransomware gang to infect around 1,500 organizations with data encrypting malware, says it has obtained a universal decryption key for victims of the July 4 weekend hack. Now, organizations hit by this attack can recover their data without having to rebuild their systems […]

Read More

Ransomware

Ransomware Is Now More Than Just Data Encryption

In addition to encrypting your data, cybercriminals are threatening to release sensitive data unless the ransom is paid.

July 20, 2021 Zachary Comeau Leave a Comment

Ransomware continues to be a cybersecurity pandemic as organizations are being forced to either rebuild their systems from scratch or pay six-figure ransoms for a decryption tool from the hackers that might not even work that well. However, cybercriminals are getting smarter and are adopting new methods and techniques, and having your data held hostage […]

Read More

Expel Introduces Offering for Detecting Business Email Compromise

July 20, 2021 TechDecisions Staff Leave a Comment

Expel for Email monitors security signal from Microsoft O365 or GSuite, along with Duo, Okta, AzureAD and OneLogin to detect attacker activity Solution alerts on signs of business email compromise (BEC), and detects things like risky config changes, logins via proxy servers and attempts to bypass multi-factor authentication HERNDON, Va.–(BUSINESS WIRE)–Expel, the managed detection and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Page 29
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.