• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

FireEye
Featured Video Play Icon

FireEye Security Platform Has New Cloud Capabilities

New cloud-focused capabilities from FireEye Security bring detection & protection regardless of location, defending increasingly complex environments.

October 10, 2019 TechDecisions Staff Leave a Comment

FireEye, Inc. introduces new cloud security capabilities at its annual Cyber Defense Summit, including a strategic partnership with iboss, and availability on Amazon Web Services Marketplace. The FireEye Cloud Security Solution includes capabilities accessible through new cloud versions of FireEye Network Security, new Detection On Demand, a new secure web gateway offering with iboss, as […]

Read More

iot security dangers, IoT dangers, IoT device security

Security Risks & Potential Dangers of IoT

IoT device security is a very, VERY complicated topic. Here are some common IoT dangers and how to avoid your network being compromised.

October 8, 2019 Joe Zulick Leave a Comment

The “Internet of Things,” often referred to in its abbreviated form “IoT,” is the result of the inevitable revolution of networking commonly used essential items and appliances such as refrigerators, light switches, cameras, sensors, and other forms of hardware. Even my toothbrush has network functionality via Bluetooth. The term “IoT device” typically references a class […]

Read More

remote connectivity hacking

Tips for Avoiding Remote Connectivity Hacking

Remote connectivity hacking can be trickier to spot as scams are becoming more advanced. Here's how to address them at your organization.

October 3, 2019 Finn Faldi Leave a Comment

For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true remote connectivity hacking scam today relies on sophisticated social engineering fueled with detailed information on the […]

Read More

Axis Communications, 4K PTZ Cameras
Featured Video Play Icon

Axis Communications New 4K PTZ Cameras Have Extra Light Sensitivity

The latest 4K PTZ Cameras from Axis Communications stress enhanced low-light performance for PTZ and license plate idenfication applications.

September 19, 2019 TechDecisions Staff Leave a Comment

Axis Communications announces new 4K PTZ cameras and license plate identification cameras. Here’s more information provided by the company: 4K PTZ cameras with ultra-high light sensitivity Featuring 4x zoom and a Canon lens, the AXIS Q1798-LE Network Camera comes with IP66, IP67 and IK10 ratings and can handle extreme temperatures ranging from -40 °F to 140 °F. […]

Read More

Virtual Desktop Infrastructure, Harlingen WaterWorks
Featured Video Play Icon

Scale Computing HC3 Virtual Desktop Infrastructure Puts It All In One Place

Scale Computing HC3 virtual desktop infrastructure helps Harlingen WaterWorks System bring virtualization, servers, storage & backup into one platform.

September 16, 2019 Jonathan Blackwood Leave a Comment

The Harlingen WaterWorks System (HWWS) serves approximately 27,000 water customers, as well as the towns of Combes, Primera and Palm Valley. HWWS also services over 19,000 sewer accounts in addition to the towns of Combes and Primera. The Tech Decision A user of virtual desktop infrastructure (VDI) technology for over six years, Harlingen WaterWorks System […]

Read More

Trustwave Fusion Cloud-Based Cybersecurity

Trustwave Fusion Platform Redefines Cloud-Based Cybersecurity

Trustwave Fusion, a cloud native platform, provides visibility over how security resources are provisioned, monitored and managed across any environment.

September 5, 2019 TechDecisions Staff Leave a Comment

Trustwave announces Trustwave Fusion platform “to meet the enterprise where they are today in their operations and in the future as they embrace digital transformation,” the company says. The Trustwave Fusion platform connects the digital footprints of enterprises and government agencies to a security cloud comprised of the Trustwave data lake, analytics, threat intelligence, security services and Trustwave […]

Read More

unchecked admin accounts, best practices

The Hidden Dangers of Unchecked Admin Accounts

Unchecked admin accounts are a danger to your organization's business: by not monitoring admins, you're leaving a door wide open to data threats.

August 29, 2019 Mitesh Patel Leave a Comment

So long as a user account is live and operative within your IT infrastructure, it is a potential gateway into your organization and makes it as easy as leaving a back window open into any device or application on your network being used via that account. Not having a clear record of all unchecked admin […]

Read More

most important cybersecurity training tips

Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees

We highlight the most critical cybersecurity training tips for employees because every business, whether big or small, experiences cyber threats.

August 6, 2019 David Share Leave a Comment

It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threat to a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This means you could probably stand to receive a […]

Read More

Proofpoint CISO, CISOs cyberattack

A New ‘Zip Bomb’ Can Turn a 46MB File into 4.5 Petabytes

When decompressed, a zip bomb of that size would fill up your whole hard drive and act as malware.

August 5, 2019 Sam Harton Leave a Comment

When decompressed, a zip bomb of that size would fill up your whole hard drive and act as malware.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? July 15 Edition

What types of cyberattacks were carried out this week, July 15, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

July 15, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, July 15, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.