• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: remote work

Fieldpiece Instruments Introduces The All-New Job Link® System App

March 29, 2022 TechDecisions Staff Leave a Comment

Upgraded Functionality, Improved User-Experience and Exciting New Features Let You Link Your Tools and Your Jobs ORANGE, Calif.–(BUSINESS WIRE)–Fieldpiece Instruments, the leading manufacturer of professional-grade tools for HVACR pros by HVACR pros, announced the roll out of its all-new Job Link® System Application. Job Link initially hit the market in 2015, allowing technicians to “see […]

Read More

Google, Bard

Update Google Chrome, Microsoft Edge To Patch Vulnerability Now

Organizations are being urged to deploy a patch to address a newly discovered zero-day vulnerability in Google Chrome, Microsoft Edge.

March 28, 2022 Zachary Comeau Leave a Comment

Google and Microsoft are urging organizations to deploy a patch to address a newly discovered zero-day vulnerability in Chrome. Other than being called a “Type Confusion in V8” and that an exploit for it exists in the wild, details about this particular vulnerability are scarce. Google says the Chrome update 99.0.4844.84 for Windows, Mac and […]

Read More

CISA Software Security

CISA Adds 66 CVEs to Known Exploited Vulnerabilities List

The majority of the new additions to CISA's list of known exploited vulnerabilities are several years old, including 8 from 2010 or earlier.

March 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added 66 software security bugs that are being actively exploited to its database of known exploited vulnerabilities, including some from leading technology vendors that date back several years. For the majority of the products implicated in the new additions, there are patches available to remediate the […]

Read More

Pixxel Announces $25M Investment Led By Radical Ventures To Advance The World’s Most Detailed Imaging Satellites for Earth Health Monitoring

March 28, 2022 TechDecisions Staff Leave a Comment

Leader in Hyperspectral Remote Sensing Reaches Groundbreaking Milestone with Satellite Demonstration Ahead of SpaceX Transporter-4 Launch PALO ALTO, Calif. & BANGALORE, India–(BUSINESS WIRE)–Pixxel, a leader in cutting-edge earth-imaging technology, announced a $25 million Series A led by Radical Ventures, a Toronto-based firm known for investing in entrepreneurs that use artificial intelligence to transform massive industries. […]

Read More

EchoNous Wins 2022 Artificial Intelligence Excellence Award

March 25, 2022 TechDecisions Staff Leave a Comment

REDMOND, Wash. & PHILADELPHIA–(BUSINESS WIRE)–EchoNous, the leader in portable AI-guided ultrasound tools and software, announced today that the Business Intelligence Group named EchnoNous a winner in its Artificial Intelligence Excellence Awards program. EchoNous has developed Kosmos, the most advanced, ultra-portable, AI-guided point- of-care-ultrasound (POCUS) device rivaling cart-based ultrasound image quality, enabling high-resolution imaging and diagnosis […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

30% Of Log4j Instances Remain Vulnerable To Exploitation

Qualys finds that nearly a third of Log4j instances remain vulnerable to attack more than three months after the flaw was discovered.

March 24, 2022 Zachary Comeau Leave a Comment

More than two months after the Log4j vulnerabilities known as Log4Shell were discovered, 30% of Log4j instances remain vulnerable for hackers to exploit and take control of affected systems, according to cybersecurity firm Qualys. The company indexed more than 10 trillion data points across its installed enterprise customer base and completed six billion IP scans […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast Episode 156: Preventing Shadow IT

Uri Haramati, co-founder and CEO of Torii, joins the podcast to talk about shadow IT and how it can be prevented.

March 24, 2022 Zachary Comeau Leave a Comment

Uri Haramati, co-founder and CEO of Torii, joins the podcast to talk about shadow IT and how it can be prevented.

Read More

Zero Trust, Leostream, AWS

Zscaler Introduces Advanced Zero Trust Solutions to Minimize Attack Surface, Prevent Lateral Movement

Zscaler is launching three new zero trust network access innovations designed to replace legacy firewalls and VPNs.

March 23, 2022 Zachary Comeau Leave a Comment

Cloud security provider Zscaler is launching what it says are three industry-first zero trust network access innovations designed to replace legacy firewalls and VPNs delivered as part of the company’s Zero Trust Exchange. According to the company, the offerings — private app protection, integrated deception and privileged remote access for industrial IoT and OT systems […]

Read More

Crestron 1 Beyond

Crestron Bolsters Intelligent Video Technology With New Acquisition

1 Beyond's intelligent video technology will strengthen Crestron's videoconferencing, control and automation offerings for collaboration.

March 23, 2022 TD Staff Leave a Comment

Rockleigh, N.J.-based Crestron announced its planned acquisition of the intelligent video technology that Boston-based 1 Beyond developed. Crestron is, of course, a globally known provider of workplace automation and collaboration solutions. In an interview with our sister publication Commercial Integrator, Crestron’s executive vice president, marketing, Brad Hintze, confirms that Crestron plans to integrate all existing […]

Read More

Lapsus$ Microsoft Okta

Lapsus$ Attacks: Microsoft Says Group Pays Employees For Initial Access; Okta Provides Attack Timeline

Microsoft and Okta provide more details on the Lapsus$ hacking group, including how it gains initial access and impacts to both companies.

March 23, 2022 Zachary Comeau Leave a Comment

Microsoft acknowledges Lapsus$ accessed source code, downplays risk to customers and risk of elevation Lapsus$ uses extensive social engineering, including paying victims’ employees for initial access and convincing help desks to reset credentials Group uses VPNs, RDP, VDI and identity providers such as Azure AD, Okta in attacks Okta says 2.5% of customers potentially impacted […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 122
  • Page 123
  • Page 124
  • Page 125
  • Page 126
  • Interim pages omitted …
  • Page 224
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.