• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: ransomware

Microsoft Security RSA Conference

IT Can Now Use Defender for Endpoint to Contain Unmanaged Devices

Microsoft Defender for Endpoint can now isolate unmanaged devices that are suspected of being compromised.

June 13, 2022 Zachary Comeau Leave a Comment

Microsoft Defender for Endpoint can now isolate unmanaged devices that are suspected of being compromised and block it from any incoming or outgoing communication with devices enrolled in Defender for Endpoint. According to Microsoft, this is designed to help prevent human-operated ransomware from moving laterally and spreading from an unmanaged device throughout an organization’s network. […]

Read More

Zero Trust, Leostream, AWS

BlackBerry Launches Zero Trust Network Access Solution with CylanceGATEWAY

Blackberry, CylanceGATEWAY unveiled a new ZTNA solution designed to defend against evolving threat landscapes.

June 10, 2022 TD Staff Leave a Comment

Security software and services provider BlackBerry Limited unveiled a new zero trust network access (ZTNA) as-service with CylanceGATEWAY. The new service is designed to securely enable remote workers and prevent malicious threat actors from compromising corporate networks using advanced AI-driven cybersecurity. Available to customers globally from July 2022, CylanceGATEWAY will provide businesses of all sizes […]

Read More

healthcare ransom payment cybersecurity

Foundational Tips for Fighting Healthcare’s Top Cyberthreats

With ransomware attacks in the healthcare sector on the rise, here are some basic tips for creating a stronger cybersecurity posture.

June 9, 2022 Tom Neclerio Leave a Comment

In 2021 alone, the healthcare industry saw a 123% increase in ransomware attacks and sensitive data breaches likely as a result of the pandemic. It is of no surprise that cyberattacks have only continued to escalate and intensify across healthcare institutions – further destabilizing the medical field, adding to concerns among patients, and creating more […]

Read More

Cloud Data Breaches and Cloud Complexity on the Rise, Reveals Thales

June 7, 2022 TechDecisions Staff Leave a Comment

Multi-cloud adoption is accelerating with 72% of organizations using multiple IaaS providers vs. 57% in 2021 66% of organizations store 21%-60% of their sensitive data in the cloud 45% have experienced a data breach or failed an audit involving data and applications in the cloud vs. 35% in 2021 PARIS LA DÉFENSE–(BUSINESS WIRE)–The 2022 Thales […]

Read More

Wasabi Technologies Doubles Down on APAC Expansion with Singapore Storage Region

June 5, 2022 TechDecisions Staff Leave a Comment

25-Year year APAC industry veteran Michael King to lead Wasabi APAC Operations BOSTON & SINGAPORE–(BUSINESS WIRE)–Wasabi Technologies, the hot cloud storage company, reaffirmed its commitment to the Asia-Pacific market with the opening of a new storage region located in Singapore. This marks Wasabi’s 13th storage region globally and its fourth in APAC, following Tokyo, Osaka, […]

Read More

The Great Resignation Reaches the Cybersecurity Industry, According to Deep Instinct Report

June 2, 2022 TechDecisions Staff Leave a Comment

– Latest edition of annual Voice of SecOps survey discovered increased and unsustainable stress levels. 45% of respondents admit that they have considered quitting the industry – Ransomware is the biggest stress factor with more than one-third (38%) of respondents making a ransom payment and 84% experiencing continued disruption after payment NEW YORK–(BUSINESS WIRE)–Deep Instinct, […]

Read More

NSA Programming Languages

Marsh & Microsoft Report: IT Pros, Leaders Must Align More on Cyber Risk

With cyber attacks imminent, organizations must commit to ongoing, cross-functional, cyber risk communication across the enterprise.

June 1, 2022 TD Staff Leave a Comment

A report by insurance broker Marsh and tech giant Microsoft looks at how cyber risk is viewed by various functions and leaders within organizations, specifically cybersecurity and IT, risk management and insurance, finance and executive leadership. While all functions have common interests around cyber risks, the report finds that they often act independently. All departments […]

Read More

CyberCube Partners With Kroll to Launch Response Service for Cyber Insurance Industry

May 30, 2022 TechDecisions Staff Leave a Comment

SAN FRANCISCO–(BUSINESS WIRE)–#cyber–Cyber risk analytics provider CyberCube has today launched CAERS, a new cyber incident response service for clients of the company’s SaaS products. The Cyber Aggregation Event Response Service (CAERS) will see CyberCube partnering with Kroll, the leading provider of data, technology and insights related to risk, governance and growth, to provide CyberCube’s clients […]

Read More

Cybersecurity testing, penetration testing, cyber threats

MSSP Thrive Upgrades SOC With SOAR Integration

Thrive's SOAR integration is designed to significantly reduce incident response times for client threats and provide higher quality security.

May 24, 2022 Zachary Comeau Leave a Comment

Thrive, a managed security services provider with more than 1,500 global customers, has upgraded their around-the-clock Security Operation Center with the integration of a Security Orchestration Automation and Response (SOAR) engine designed to enable the firms’ global security team to enhance its clients’ security. According to the company, the integration features tool aggregation and coordinated […]

Read More

Update Released For ActiveImage Protector™ 2022

May 24, 2022 TechDecisions Staff Leave a Comment

WILDOMAR, Calif.–(BUSINESS WIRE)–Actiphy Inc., a leading publisher of backup, disaster recovery, and virtualization software announces a release update of ActiveImage Protector 2022 that places an emphasis on minimizing Recovery Time Objectives (RTO). Background Businesses are required to prepare and implement disaster recovery, and business continuity plans. Natural disasters have become more impactful, and as global […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Interim pages omitted …
  • Page 56
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.