• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: ransomware

Russia Ukraine Cyberattacks

Cybersecurity Experts: Ukraine, Russia Crisis Could Result in U.S. Cyberattacks

Cybersecurity experts are warning organizations to be extra vigilant against cyberattacks as the Russia-Ukraine crisis unfolds.

February 16, 2022 Zachary Comeau Leave a Comment

As the world waits to see what unfolds in Ukraine, cybersecurity professionals are urging western governments and organizations to be prepared for serious cyberattacks coming from Russia and its allies. These warnings come from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) as well as private sector cybersecurity software providers like Mandiant that have raised […]

Read More

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Introduces Chrome OS Flex To Replace Windows, macOS On Older Devices

Google says Chrome OS Flex will be compatible with its cloud-based management and help modernize endpoints already in the IT environment.

February 15, 2022 Zachary Comeau Leave a Comment

Google has introduced a new version of Chrome OS that can turn PCs and Macs into a Chromebook, and the software designed for businesses and schools will be free to download, the company says. In a blog, the company says Chrome OS Flex will be fully compatible with Google’s cloud-based management and helps modernize endpoints […]

Read More

Proofpoint CISO, CISOs cyberattack

Red Canary Adds 24/7 Remediation, Protection Features

Cybersecurity firm Red Canary has added new protections for systems beyond the endpoint and a new active 24/7 threat response offering.

February 15, 2022 Zachary Comeau Leave a Comment

Threat detection provider Red Canary has added new capabilities and active remediation features to its cybersecurity offerings, including protections for systems beyond the endpoint and a new active 24/7 threat response offering. According to the company, the new threat investigation and active remediation features are designed to help customers investigate, triage and respond to threats, […]

Read More

Attivo Networks Innovations in Identity Security Snap up 6 Golds at the 2022 Cybersecurity Excellence Awards

February 10, 2022 TechDecisions Staff Leave a Comment

Company is a Gold Winner in CIEM, Cloud Security, Deception Technology, Endpoint Security, Ransomware Protection and Vulnerability Management FREMONT, Calif.–(BUSINESS WIRE)–#AttivoNetworks–Attivo Networks®, the experts in identity security and lateral movement attack prevention, today announced that the company has been recognized as a winner for the 2022 Cybersecurity Excellence Cybersecurity Product / Service Awards. This is […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Cybercriminals Are Using Malware To Target Linux-Based Systems

VMware Threat Analysis Unit (TAU) details how cybercriminals are targeting Linux-based systems with ransomware and cryptojacking attacks.

February 9, 2022 TD Staff Leave a Comment

With 90% of multi-cloud environments running on Linux-based systems and current malware countermeasures mostly focused on addressing Windows-based threats, attackers have found a golden opportunity to strike as cybercriminals are increasingly targeting Linux-based operating systems, according to latest research from VMware. The company’s new report, “Exposing Malware in Linux-based Multi-Cloud Environments,” shows ransomware is evolving […]

Read More

Beyond Identity

Phishing Attacks That Bypass MFA Could Become The Norm

Proofpoint says threat actors are increasingly leveraging phishing kits that can bypass mutli-factor authentication methods.

February 4, 2022 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) is now a standard cybersecurity practice—or at least it should be—across an organization’s IT environment. MFA has been proven to stop hackers from accessing accounts and thwart ransomware attacks from happening with compromised credentials alone. However, like with most IT security safeguards, cybercriminals are finding ways around it with phishing attacks that […]

Read More

SBOMs, Microsoft, Salus

SBOMs Will Become A Necessity In IT Ecosystem

New research suggests that a software bill of materials (SBOM) will become a critical piece of software supply chain security.

February 4, 2022 Zachary Comeau Leave a Comment

IT professionals and software developers should prepare for Software Bills of Materials (SBOMs) to become a regular part of the IT ecosystem, according to new research from the Linux Foundation. The term, while already known to IT professionals, became more popular in the wake of several software supply chain security crises, including the SolarWinds compromise, […]

Read More

ComplyAdvantage Releases 2022 State Of Financial Crime Report

February 3, 2022 TechDecisions Staff Leave a Comment

Designed as a strategic roadmap for compliance teams, the comprehensive annual report covers financial crime insights related to SARs, cybercrime, geopolitical hotspots, crypto regulations and, the ever-changing sanctions landscape LONDON & NEW YORK–(BUSINESS WIRE)–ComplyAdvantage, a global data technology company transforming financial crime detection, today announced the availability of the firm’s much anticipated annual report – […]

Read More

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

February 2, 2022 TechDecisions Staff Leave a Comment

Menlo identified 224% increase in HEAT attacks in the last six months fueling ransomware surge MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–#cloudsecurity—Menlo Security, a leader in cloud security, today announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. HEAT attacks are a class of cyber threats targeting web […]

Read More

Tenable Research 2021 threat landscape retrospective report

The Top Vulnerabilities of 2021

Cybersecurity firm Tenable rounds up the top vulnerabilities in 2021, noting increases in ransomware attacks, data breaches, zero-days and more.

January 31, 2022 TD Staff Leave a Comment

Tenable’s 2021 Threat landscape retrospective report looks back at year unlike any other. Dozens of groups, like REvil, Conti, DarkSide and more, dominated the headlines and continued to wreak havoc across a wide range of industries. Tenable’s research team noted a surge in ransomware attacks, data breaches, zero-days and much more in 2021. Top vulnerabilities […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Interim pages omitted …
  • Page 56
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.