• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

iOS macOS vulnerabilities

Qualcomm Secures Important Precedent and $31 Million In Legal Victory Against Apple

In a heated and drawn-out legal battle between the two tech giants, a jury determined that Apple violated Qualcomm patents.

April 10, 2019 Sam Harton Leave a Comment

In a heated and drawn-out legal battle between the two tech giants, a jury determined that Apple violated Qualcomm patents.

Read More

Internet of Things

Internet of Things Security Market Size Set to Skyrocket

Greater connectivity and reliance on the cloud creates a need for better security to Internet of Things technology.

April 3, 2019 Lisa Montgomery Leave a Comment

Greater connectivity and reliance on the cloud creates a need for better security to Internet of Things technology.

Read More

NETSCOUT nGeniusEDGE Server

How to Maintain Security When Employees Work Remotely

Many companies are allowing employees to work remotely more frequently as a recruitment and retention strategy, but that can't interfere with the security of the company's network.

March 19, 2019 Kevin Austin Leave a Comment

Many companies are allowing employees to work remotely more frequently as a recruitment and retention strategy, but that can’t interfere with the security of the company’s network.

Read More

Tools and Tips to Protect Your Organization from Ransomware

Ransomware Detection and Response Technology

March 5, 2019 TD Staff Leave a Comment

As the name implies, a ransomware attack involves holding a company at ransom for information or control that the threat actor has stolen from the organization. Understanding how these attacks can impact your organization are an important step in protecting your network.

Read More

What Decision Makers Need to Know About Faulty Android Antivirus Apps

A recent test shows that most of them are a sham, and don’t protect users against viruses as advertised.

March 3, 2019 Jessica Messier Leave a Comment

A recent test shows that most of them are a sham, and don’t protect users against viruses as advertised.

Read More

Week in Review: Next-Gen Networks, Generation Z, Reverse Culture, etc.

This week, February 11th-15th, 2019: Part II of visibility in next-gen networks, Generation Z enters the workforce, hiring employees for culture, and more.

February 15, 2019 TechDecisions Staff Leave a Comment

This week, February 11th-15th, 2019: Part II of visibility in next-gen networks, Generation Z enters the workforce, hiring employees for culture, and more.

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast – Episode 58, Tunde Odeleye of PCM

Host Jonathan Blackwood speaks with Tunde Odeleye about malware, ransomware, cybersecurity technology, and more.

February 12, 2019 TechDecisions Staff Leave a Comment

Host Jonathan Blackwood speaks with Tunde Odeleye about malware, ransomware, cybersecurity technology, and more.

Read More

The Critical Role of Visibility in Next-Generation Networks – Part II

Diving into how network TAPs and Packet Brokers harvest the critical network traffic data IT teams rely on to feed a wide array of networking and security solutions.

February 11, 2019 Alastair Hartrup Leave a Comment

Diving into how network TAPs and Packet Brokers harvest the critical network traffic data IT teams rely on to feed a wide array of networking and security solutions.

Read More

The Critical Role of Visibility in Next-Generation Networks – Part I

One major challenge for IT managers is managing and securing their network in an environment that’s constantly and rapidly evolving.

January 31, 2019 Alastair Hartrup Leave a Comment

One major challenge for IT managers is managing and securing their network in an environment that’s constantly and rapidly evolving.

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast – Episode 56, Author D. Greg Scott

Host Jonathan Blackwood talks to D. Greg Scott, Author of “Virus Bomb,” about commercial ransomware attacks and cybersecurity best practices.

January 29, 2019 TechDecisions Staff Leave a Comment

Host Jonathan Blackwood talks to D. Greg Scott, Author of “Virus Bomb,” about commercial ransomware attacks and cybersecurity best practices.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.