• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: remote work security

Trellix Finds Escalation of Cyberattacks Targeting Critical Infrastructure as Geopolitical Tensions Rise

April 27, 2022 TechDecisions Staff Leave a Comment

New Report Details Wiper Malware Aimed at Ukraine and Upsurge in Cyber Threats from Likely Russian-backed Actor in the Fourth Quarter of 2021 News Highlights Advanced persistent threat (APT) actors most often targeted the transportation and shipping sectors in Q4 2021. APT29, believed to conduct operations for Russian government entities, ranked most active among nation-state […]

Read More

Kaseya Expands Its Global Footprint With New Office in Poland

April 26, 2022 TechDecisions Staff Leave a Comment

Company to create a tech ecosystem by hiring 500 local engineers over the next three years KRAKÓW, Poland–(BUSINESS WIRE)–Kaseya, a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBs), announced today they are expanding their European presence with the launch of an office in […]

Read More

Options Achieve VMware Cloud Verified Status in LHC

April 25, 2022 TechDecisions Staff Leave a Comment

NEW YORK & LONDON & HONG KONG–(BUSINESS WIRE)–Options Technology, the leading Capital Markets services provider, today announced the achievement of VMware Cloud Verified status in their London LHC data center. The accomplishment follows the VMware Cloud Provider Principal Partner Status awarded to the firm last year, along with cloud verified status at LD4 and NY5 […]

Read More

Active Directory Misconfigurations

Common Active Directory Misconfigurations That Could Lead to Compromise

Cybersecurity firm Mandiant lays out the 12 most common Active Directory misconfigurations it has seen during 2021.

April 22, 2022 Zachary Comeau Leave a Comment

Cybersecurity services provider Mandiant has released its M-Trends 2022 report, based on data from the company’s investigations between October 2020 and the end of 2021, and it shows that while cyber defenses and techniques are improving, attackers are also continuing to adapt to new trends. Based on the company’s investigations, the report also outlines some […]

Read More

Person using Epiphan Connect with remote participants onscreen. The logo of Epiphan Video appears on the upper-right corner.

Epiphan Connect Enables Videoconferencing and Broadcast with Microsoft Teams

Epiphan Video's Connect tool will make broadcast-quality livestreaming more accessible with the help of Microsoft Teams.

April 22, 2022 TD Staff Leave a Comment

Palo Alto, Calif.-based Epiphan Video, prominent in video capture, streaming and recording solutions, announced Epiphan Connect. This cloud-based tool makes broadcast-quality livestreaming more accessible through the convenience and familiarity of Microsoft Teams. Epiphan Connect Features The new tool by Epiphan enables users to extract Teams participant feeds and bring them into any device or software […]

Read More

Jellyfish Pictures Selects Hammerspace to Provide Global Data Environment for Virtual Production

April 22, 2022 TechDecisions Staff Leave a Comment

Hammerspace with Microsoft Azure and Autodesk ShotGrid Skyrockets Jellyfish’s Visionary Leadership in Virtual Studios SAN MATEO, Calif.–(BUSINESS WIRE)–#Globaldata—Hammerspace, the pioneer of the Global Data Environment, today announced that Jellyfish Pictures has deployed Hammerspace to advance the company’s virtual studio strategy and fuel ongoing massive business growth. The Hammerspace Global Data Environment is the first technology […]

Read More

BrainChip and NVISO Partner on Human Behavioral Analytics in Automotive and Edge AI Devices

April 19, 2022 TechDecisions Staff Leave a Comment

LAGUNA HILLS, Calif. & LAUSANNE, Switzerland–(BUSINESS WIRE)–BrainChip Holdings Ltd (ASX: BRN, OTCQX: BRCHF, ADR: BCHPY), the world’s first commercial producer of neuromorphic AI IP and chips, and nViso SA (NVISO), the leading human behavioral analytics AI company, today announced a collaboration targeting battery-powered applications in robotics and mobility/automotive to address the need for high levels […]

Read More

Google Cybersecurity Certificate

More than 75% Of Organizations Say They’ll Be Attacked In Next 12 Months

Trend Micro's Cyber Risk Index suggests that organizations invest in people, processes and technology to prepare for cyberattacks.

April 19, 2022 Zachary Comeau Leave a Comment

More than three-quarters of organizations believe they’ll be successfully attacked over the next year as the cyber risk level continues to rise, according to new research from cybersecurity firm Trend Micro that suggests organizations allocate more resources to people, processes and technology to be more prepared for cyberattacks and reduce their overall risk levels. The […]

Read More

Blackmagic Design Announces New Blackmagic Cloud Pod

April 18, 2022 TechDecisions Staff Leave a Comment

Convert any USB-C disk into high speed network storage, with 10G Ethernet, Dropbox sync and HDMI monitoring. FREMONT, Calif.–(BUSINESS WIRE)–Blackmagic Design today announced Blackmagic Cloud Pod which lets you use any USB-C disk as network storage. The Blackmagic Cloud Pod means customers can build their own network storage using USB-C flash disks they already own. […]

Read More

Human hand with magnifying glass found spam email with skull and cross bones computer virus on laptop computer. ZLoader attack

How to Identify and Defend Against ZLoader Attacks

Microsoft is warning of ZLoader attacks— here's how to spot it and defend against the disabling security and antivirus trojan.

April 14, 2022 TD Staff Leave a Comment

Microsoft 365 Defender Threat Intelligence Team has released details and a warning about the ZLoader Trojan. The ZLoader trojan, known for its ability to evolve and change from campaign-to-campaign, is said to be derived from the Zeus banking trojan first discovered in 2007. Microsoft says ZLoader is an attacker’s tool of choice— it has defense […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 50
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Interim pages omitted …
  • Page 108
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.