• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: remote work security

Cisco Live 2023

Cisco Announces Cisco Catalyst IW9167 Series for Industrial, Outdoor Spaces

Cisco's Catalyst IW9176 Series is a new line off Wi-Fi access points for outdoor, industrial spaces that can operate as a backhaul.

May 24, 2022 Zachary Comeau Leave a Comment

Cisco is launching new technologies designed for operational environments to help organizations connect, automate and operate anywhere, including an outdoor Wi-Fi 6E-ready access point and an enhanced Cisco IoT operations dashboard. The announcement is centered around the Cisco Catalyst IW9167 Series, a new series of Wi-Fi access points for outdoor and industrial spaces, with flexible […]

Read More

Human Connection and Trust Unlock Productivity, Retention and Revenue Growth, Accenture Research Finds

May 24, 2022 TechDecisions Staff Leave a Comment

Only 1 in 6 people feels strongly connected at work, with on-site workers least connected of all “Omni-connected experiences” help workers realize full potential NEW YORK–(BUSINESS WIRE)–At a time when talent markets are in flux and businesses are still navigating the impact of the COVID-19 pandemic, new research from Accenture (NYSE: ACN) reveals that only […]

Read More

3CX Supply Chain Attack

Watch Out For This Linux DDoS Trojan, Microsoft Says

Microsoft says it has observed a 254% increase in activity from XorDdos, an eight-year-old Linux trojan targeting Linux-based systems.

May 23, 2022 Zachary Comeau Leave a Comment

Microsoft says it has observed a 254% increase in activity over the last six months from an eight-year-old Linux trojan targeting Linux-based operating systems on cloud infrastructures and IoT devices. The malware, called XorDdos, is named after its attack method, denial of service on Linux endpoints and servers, in addition to XOR-based encryption for its […]

Read More

Welbilt KitchenConnect Launches the Largest Smart Restaurant Ecosystem for the Foodservice Industry

May 20, 2022 TechDecisions Staff Leave a Comment

NEW PORT RICHEY, Fla.–(BUSINESS WIRE)–#bettertogether–Welbilt, Inc. (NYSE:WBT), a leading provider of commercial equipment and cloud device management for the foodservice industry, is proud to announce today the launch of the Largest Smart Restaurant Ecosystem. The ecosystem is powered by the biggest digital companies in the Internet of Things (IoT) space that will empower its homegrown […]

Read More

VMware

Patch These Four VMware Vulnerabilities Immediately

After several large organizations have reported attacks, VMware and CISA are urging others to patch these four vulnerabilities immediately.

May 19, 2022 Zachary Comeau Leave a Comment

Organizations are being urged to patch certain VMware products as threat actors are chaining a series of unpatched vulnerabilities in some of the company’s products to gain full system control, even as patches have been available for several weeks. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), threat actors, likely sophisticated groups, are […]

Read More

Aqara Announces Fully-Automatic Smart Door Lock D100 Zigbee

May 19, 2022 TechDecisions Staff Leave a Comment

NEW YORK–(BUSINESS WIRE)–Aqara, a leading provider for smart home products, expanded its smart door lock portfolio by releasing a new mortise-style lock, the D100 Zigbee, which is the brand’s third smart lock for the global market. Unlike the previous N100 Zigbee and A100 Zigbee which are more traditional handle locks, the new D100 Zigbee is […]

Read More

CIO, CISO cyber attack confidence

Half of Global CISOs Feel Unprepared to Cope with a Cyber Attack

Despite growing confidence in security posture, Proofpoint’s latest report reveals CISOs feel unprepared to cope with a cyber attack.

May 18, 2022 TD Staff Leave a Comment

With the 2020 scramble to enable remote working, many CISOs have now come to terms with new ways of working. Many CISOs feel more in control of their environment: 48% feel that their organization is at risk of suffering a cyber attack within the next 12 months, down from 64% last year, according to Proofpoint’s […]

Read More

Windows 365 Citrix

Citrix, Microsoft To Integrate Windows 365 and Citrix HDX

Integration will allow users to access their cloud-hosted Windows 11 or Windows 10 desktops from anywhere, on any device, companies say.

May 18, 2022 Zachary Comeau Leave a Comment

Citrix and Microsoft are deepening their partnership to bring new integrations to Microsoft’s cloud PC offering, combining Citrix’s high-definition user experience technology, IT policy control and ecosystem flexibility with Windows 365. The companies say the expanded partnership and new integration between Citrix high definition user experience (HDX) technology and Windows 365 is designed to give […]

Read More

Crystal Group Brings AI to Power Grid With First GPU-Accelerated Substation Servers

May 18, 2022 TechDecisions Staff Leave a Comment

HIAWATHA, Iowa–(BUSINESS WIRE)–Crystal Group, Inc., a leading designer and manufacturer of rugged computer and electronic hardware, announced today its release of the first GPU-accelerated substation servers designed to bring cutting-edge artificial intelligence (AI) capabilities to the utilities market. With the flexibility to integrate the precision and power of NVIDIA RTX GPUs based on the NVIDIA […]

Read More

Cryptojacking, Sysrv

Microsoft: Watch Out For This New Sysrv Botnet Varient

Microsoft is urging organizations to secure their systems after discovering a new Sysrv botnet variant that leverages security bugs.

May 17, 2022 Zachary Comeau Leave a Comment

Microsoft is urging organizations to secure internet-facing systems, apply security updates and secure credentials after discovering a new variant of the Sysrv botnet, which is known for exploiting vulnerabilities in web apps and databases to install coin miners on Windows and Linux systems. In a series of tweets, the Redmond, Wash. IT giant says the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Page 51
  • Interim pages omitted …
  • Page 108
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.