• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: red hat

MIcrosoft Entra External ID

Microsoft: Basic Auth Will be Disabled Next Month

Microsoft will permanently turn off basic auth for multiple protocols for many Exchange Online tenants next month.

December 22, 2022 Zachary Comeau Leave a Comment

With a holiday break upon us, Microsoft is again warning Exchange customers of deprecation of basic authentication in Exchange, which will take place early in the new year once employees come back from a long break. The Redmond, Wash.-based IT giant has been warning customers of this move for awhile, and the time has finally […]

Read More

Microsoft Apple macOS bug

Microsoft Discovers macOS Security Bypass Bug

Microsoft says it has uncovered a vulnerability in macOS that could allow attackers to bypass Apple’s Gatekeeper security mechanism.

December 22, 2022 Zachary Comeau Leave a Comment

Microsoft says it has uncovered a vulnerability in macOS that could allow attackers to bypass restrictions imposed by Apple’s Gatekeeper security mechanism, which is designed to ensure that only trusted apps run on the company’s devices. According to Microsoft’s Security Threat Intelligence team, the vulnerability, it calls Achilles, could allow attackers to bypass Gatekeeper and […]

Read More

FBI search engine ads, tablet, Gartner, worldwide device shipments

FBI: Beware of Search Engine Ads

Cybercriminals are using search engine ads to deploy malware and steal credentials, FBI says in new warning.

December 21, 2022 Zachary Comeau Leave a Comment

The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]

Read More

IT innovation

Gaining Buy-In for Innovation Investment

When the focus is on business transformation through IT innovation, the results can be powerful and lead to growth.

December 21, 2022 Ritesh Ramesh Leave a Comment

Every organization, regardless of its level of success, must continuously evolve and transform. It is a necessity for any organization that seeks to grow, but when the focus is on transformation through IT innovation, the results are particularly powerful. Leaders driving the digital agenda require a holistic mindset of understanding the market and industry needs […]

Read More

Neatgear WAX220 wifi access point

NETGEAR Releases New WAX220 WiFi Access Point for SMBs

NETGEAR's WAX220 WiFi 6 Access Point is a new dual-band WiFi access point designed for small business owners.

December 21, 2022 Zachary Comeau Leave a Comment

NETGEAR is releasing the WAX2220 WiFi 6 Access Point, a new dual-band WiFi access point designed for small business owners who want a budget-friendly option, quick configuration, and fast and secure WiFi. According to the San Jose, Calif.-based firm, the WAX220 is designed to be an easy-to-use, budget-friendly WiFi solution for small businesses that delivers […]

Read More

Title Slide: Utelogy achieves SOC 2 Type II standards in Data Security

Utelogy Attains SOC 2 Type II Standards in Data Security

Utelogy's information security practices, policies, procedures and operations meet the SOC 2 Type II standards for security.

December 21, 2022 Alyssa Borelli Leave a Comment

Utelogy Corp., the Los Angeles-based provider of management, monitoring and analytics software for connected workspaces, recently completed its Service Organization Control (SOC) 2 Type II certification. Conducted by Armanino, the audit affirms that Utelogy’s information security practices, policies, procedures and operations meet the SOC 2 standards for security. Armanino is a top 25 accounting and […]

Read More

SASE, SASE approaches, SASE implementation

Axonius Updates SaaS Management Offering

Axonius' latest updates further enhance the comprehensive visibility and correlation across SaaS apps, devices and users, streamlining efforts to reduce organizations’ attack surface.

December 20, 2022 TD Staff Leave a Comment

Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]

Read More

Metaverse Security

The Metaverse Presents Opportunity, but Also Security Risks

The metaverse is emerging as a valuable new business and consumer tool, but it also comes with a new set of security concerns.

December 20, 2022 Zachary Comeau Leave a Comment

The metaverse is emerging as a new technology that both consumers and businesses see as valuable for communication, collaboration, enhanced services, entertainment and real estate, but those hopes also come with the same security concerns any IT professionals have about a new technology. Nearly 70% of organizations are planning to do business in the metaverse […]

Read More

Phishing Success

U.S. Agencies Warn Food Industry About Business Email Compromise Campaigns

U.S. agencies are warning the food and agriculture sector about recent incidents of business email compromise designed to steal products.

December 19, 2022 Zachary Comeau Leave a Comment

U.S. agencies are warning organizations in the food and agriculture sector about recently observed incidents of business email compromise designed to steal shipments of food products and ingredients with hefty price tags. Instead of being used to directly steal money, these new campaigns are designed to spoof emails and domains to impersonate employees of legitimate […]

Read More

The executive hands prevent the employee from receiving and opening a spam mail, the concept of information security in companies, data protection on the internet

Phishing Scams: 5 Tips on Training Employees

Five things enterprises can incorporate into their security awareness program to cut down on human risk.

December 19, 2022 Roy Zur Leave a Comment

Phishing attacks have been around for just about as long as email, yet employees still regularly fall for them. According to the U.S. Federal Bureau of Investigation, roughly 90% of data breaches occur on account of phishing and those attacks have increased approximately 400% since the start of the COVID-19 pandemic. Assessing and reacting to […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 138
  • Page 139
  • Page 140
  • Page 141
  • Page 142
  • Interim pages omitted …
  • Page 1150
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.