• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

zoom chat leader, Enterprise Sound Bar Collaboration Kit, videoconferencing, cybersecurity

Must-Have Cybersecurity Features for Videoconferencing

Videoconferencing platforms are emerging as a new target for cyberattacks. Here are some cybersecurity actions to take to secure your calls.

March 30, 2022 TD Staff Leave a Comment

George Waller, EVP and co-founder of StrikeForce Technologies, an entrepreneur and technologist with over two decades in the cybersecurity and computer industries offers insights into must have cybersecurity features for videoconferencing and how we should be thinking about meetings in the future. Q: What are the top cybersecurity and data privacy concerns with general purpose […]

Read More

T-Mobile Has Sweet Deals on the Newest Samsung 5G Devices

March 30, 2022 TechDecisions Staff Leave a Comment

Score the Galaxy A53 5G for just $99 AND get $200 off the Samsung Galaxy Tab S8+ BELLEVUE, Wash.–(BUSINESS WIRE)–T-Mobile (NASDAQ: TMUS) today announced deals for the new Samsung Galaxy A53 5G and the Samsung Galaxy Tab S8+ 5G. Both devices are available this Thursday, March 31, with the following deals: Pick-up the Samsung Galaxy […]

Read More

Phishing Success rates

Watch Out For This Chameleon Phishing Scheme

Trustwave SpiderLabs is warning of a chameleon-like phishing scheme that adapts its background page and logo depending on the user input.

March 25, 2022 TD Staff Leave a Comment

Security researchers at TrustWave SpiderLabs encountered a phishing scheme that acts like a chameleon by changing and blending its color based on its environment. The site adapts its background page and logo depending on the user input to trick victims into giving away their email credentials. The phishing scheme starts with an email asking the […]

Read More

LastPass Breach, Hack

LastPass Business Announces Integrations with PingOne and PingFederate

Last Pass integration with PingOne and PingFederate integrates with all major identify providers saving IT time.

March 22, 2022 TD Staff Leave a Comment

Password management provider LastPass announced new integrations with Ping Identity, including PingOne and PingFederate to better serve enterprise businesses. Customers using PingOne and PingFederate as its identity provider (IdP) can now integrate with LastPass to simplify access management and easily scale proper password hygiene across entire organizations, saving time for IT departments while keeping data […]

Read More

MIcrosoft Okta Lapsus$

What We Know So Far About Okta, Microsoft and Lapsus$

Microsoft and Okta are investigating after Lapsus$ hacking group posts screenshots of purported security incidents.

March 22, 2022 Zachary Comeau Leave a Comment

This article has been amended to reflect an updated statement on the incident from Okta.  After screenshots claiming to stem from security breaches at IT giant Microsoft and identity and authentication provider Okta, both companies are investigating possible attacks from the Lapsus$ hacking group. In statements to various media outlets, the companies say they are […]

Read More

Russia Cyberattack

Russian Cyberattack Threat Evolves, Spurs New White House Warning To Harden IT Environments

The White House is urging organizations to take immediate action to harden cyber defenses Russian cyberattack threats evolve.

March 21, 2022 Zachary Comeau Leave a Comment

The White House is urging organizations to take immediate action to harden cyber defenses as credible intelligence of a Russian cyberattack in response to U.S. involvement in the Ukraine crisis continues to evolve. In a statement by President Joe Biden and a related fact sheet, the administration says there is “evolving intelligence that the Russian […]

Read More

Microsoft Internet Explorer

Reminder: Internet Explorer Retires On June 15

Organizations still using Internet Explorer are again being urged to switch to Microsoft Edge or other browsers with IE retirement imminent.

March 21, 2022 Zachary Comeau Leave a Comment

Organizations still using Internet Explorer are again being urged to switch to Microsoft Edge or any other browser with Microsoft’s legacy web browser set to be retired on June 15. In a new announcement in Windows message center, the company says “the future of Internet Explorer on Windows is in Microsoft Edge” via the IE […]

Read More

Proofpoint CISO, CISOs cyberattack

CISA: Russian Hackers Leveraged Default MFA, PrintNightmare To Gain Network Access

Using stolen credentials, misconfigured MFA and PrintNightmare, Russian state-sponsored hackers compromised a victim's network, agencies say.

March 16, 2022 Zachary Comeau Leave a Comment

According to U.S. authorities, Russian state-sponsored hackers are leveraging default multi-factor authentication (MFA) protocols and the PrintNightmare vulnerabilities to gain network access. In a joint advisory, the FBI and Cybersecurity and Infrastructure Security Agency say cyber actors backed by the Russian government began pairing those attack vectors as early as May 2021 to target a […]

Read More

Hitachi and Digital Trust Networks Trial Biometric Identity Solution Based on ADI Association Open Framework

March 14, 2022 TechDecisions Staff Leave a Comment

SANTA CLARA, Calif.–(BUSINESS WIRE)–The Accountable Digital Identity (ADI) Association today announced that Hitachi and Digital Trust Networks have trialed a solution, based on the ADI 1.0 Specification, to promote the digital transformation of hotels. The ADI Association is a nonprofit organization dedicated to advancing an open framework for digital identity focused on accountability, privacy, and […]

Read More

NSA Network Security

NSA: This Is How Admins Should Do Network Security

The National Security Agency has released a detailed guide to help administrators better secure their network.

March 7, 2022 Zachary Comeau Leave a Comment

With cybersecurity now the top concern for IT leaders and their team, dozens of organizations, including private companies, nonprofits, IT providers and cybersecurity vendors have released cyber-hardening guides over the last few years to help organizations secure their infrastructure. The U.S. Cybersecurity and Infrastructure Agency, in particular, has been a leading voice when it comes […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.