• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: mfa

Microsoft Security RSA Conference

Microsoft: MFA Adoption At 22%

Despite an evolving cyberthreat landscape, just 22% of Microsoft Azure Active Directory customers have implemented MFA, passwordless tools.

February 7, 2022 Zachary Comeau Leave a Comment

Despite a cyberthreat landscape that continues to evolve and become even more dangerous, just 22% of Microsoft Azure Active Directory customers have implemented strong identify authentication protection, Microsoft says in a new report. In the company’s Cyber Signals report, a new quarterly cyber threat intelligence brief marketed to IT and security leaders, Microsoft says less […]

Read More

Beyond Identity

Phishing Attacks That Bypass MFA Could Become The Norm

Proofpoint says threat actors are increasingly leveraging phishing kits that can bypass mutli-factor authentication methods.

February 4, 2022 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) is now a standard cybersecurity practice—or at least it should be—across an organization’s IT environment. MFA has been proven to stop hackers from accessing accounts and thwart ransomware attacks from happening with compromised credentials alone. However, like with most IT security safeguards, cybercriminals are finding ways around it with phishing attacks that […]

Read More

Phishing, Email security

Email Attacks are Evading Security Protections. Here’s How Security Teams Should Respond.

IT, security teams and end users should take these actions to combat increasingly sophisticated email threats.

June 6, 2023 Trevor Collins Leave a Comment

Instances of business email compromise (BEC) – a targeted form of phishing in which attackers try to scam companies out of money or goods or trick employees into giving up sensitive info – have continued to increase, causing devastating impacts. Last year, the FBI’s Internet Crime Complaint Center (IC3) reported $43 billion of global exposed […]

Read More

VMware EXSi security

CrowdStrike: VMware ESXi in the RaaS Crosshairs

Cybersecurity researchers are noting an uptick in Ransomware-as-a-Service groups targeting VMware ESXi vSphere hypervisors.

May 15, 2023 Zachary Comeau Leave a Comment

Cyberattacks are continuing to target VMware ESXi vSphere hypervisors, with cybersecurity firm CrowdStrike reporting today that ransomware-as-a-service (RaaS) platforms are increasingly being leveraged to deploy Linux versions of ransomware tools. According to the cybersecurity giant, these tools are specifically designed to affect VMware’s ESXi vSphere hypervisor. The company’s research into these kind of attacks date […]

Read More

YubiKey Microsoft Azure CBA

Azure AD CBA on Mobile With Hardware Security Keys Now Available

Microsoft and Yubico partnered to launch the general availability of Azure AD CBA on mobile devices using certificates on YubiKeys.

May 12, 2023 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of Azure AD CBA on iOS and Android devices using certificates on hardware security keys via USB and NFC. According to Microsoft, this allows customers to provision certificates on a hardware security key which can be used for authentication with Azure AD on iOS and Android devices, giving organizations […]

Read More

Cisco Live 2023

What You Need to Know About Cisco XDR

Cisco is launching a new XDR solution and is bringing more endpoint security capabilities of Duo MFA to all paid editions.

May 1, 2023 Zachary Comeau Leave a Comment

Cisco is launching a new extended detection and response (XDR) solution, this summer, as part of Cisco Security Cloud, a unified, AI-driven, cross-domain security platform designed to converge the company’s expertise and visibility across the network and endpoints into one security solution. The company announced the news during the annual RSA Conference. In addition, the […]

Read More

VMware DEX

VMware Launches New Solutions for Multi-Cloud Security

New VMware security tools and services are designed to help secure multi-cloud and hybrid work environments.

April 24, 2023 Zachary Comeau Leave a Comment

VMware is launching new security capabilities to help bring strong lateral security across multi-cloud environments to give organizations more visibility into threats, including new IT phishing protections and IT management features in Workspace ONE, new features for Carbon Black, an enhanced firewall service, and more. DPU-based Acceleration Highlighting the company’s announcement on the first day […]

Read More

SASE, SASE approaches, SASE implementation

Proofpoint Unveils New Innovations to Combat Increasingly Common Threats

Proofpoint's latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and more.

April 24, 2023 TD Staff Leave a Comment

Ahead of the 2023 RSA Conference, Proofpoint, Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company, unveiled a host of innovations across its Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms. The company’s latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and defend sensitive data from theft, loss and insider […]

Read More

Cloud, SASE, Aryaka

7 Strategies for Improving Your Business’s Security in the Cloud

Complexity of the cloud can make it difficult to protect data. Here are seven strategies to Improve your business’s security in the cloud.

April 11, 2023 Joseph Carson Leave a Comment

Editor’s note: This article was originally published on March 13, 2023 and has since been updated as of April 11, 2023.  Cloud computing offers numerous advantages, including flexibility, cost-effectiveness, scalability, rapid deployment and storage capacity. Still, there are inherent cybersecurity risks with cloud infrastructure, including data breaches and leaks, compromised credentials, and human errors that […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast Episode 191: Learnings From the LastPass Breach

Scott Caveza, senior research manager at Tenable, joins the podcast to discuss security lessons we've learned from the LastPass breach.

March 23, 2023 Zachary Comeau Leave a Comment

On this episode of the My TechDecisions Podcast, we discuss the LastPass breach and what IT security teams can learn from it with Scott Caveza, senior research manager at Tenable. Late last month, LastPass revealed that the same threat actor that accessed portions of the LastPass development environment and source code that has forced the company […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 12
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.