• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: supply chain attack

My TechDecisions Podcast, zero trust

My TechDecisions Episode 164: Current and Future Cybersecurity Threats

John Fokker, principal engineer & head of cyber investigations at Trellix, joins the podcast to talk about attack trends on the front lines.

June 23, 2022 Zachary Comeau Leave a Comment

John Fokker, principal engineer & head of cyber investigations at Trellix, joins the podcast to talk about attack trends on the front lines.

Read More

SolarWinds Virtual Agent AI

SolarWinds Announces New Secure Software Development Process

SolarWinds’ new build process includes new development practices and technology designed to strengthen the security of build environments.

June 22, 2022 Zachary Comeau Leave a Comment

IT management company SolarWinds, more than a year and-a-half after it was discovered that popular software was compromised via a malicious update, has unveiled a new secure software development process in a move to make the company a model for enterprise software security. SolarWinds’ “Next-Generation Build System” includes both new software development practices and technology […]

Read More

NSA Programming Languages

Marsh & Microsoft Report: IT Pros, Leaders Must Align More on Cyber Risk

With cyber attacks imminent, organizations must commit to ongoing, cross-functional, cyber risk communication across the enterprise.

June 1, 2022 TD Staff Leave a Comment

A report by insurance broker Marsh and tech giant Microsoft looks at how cyber risk is viewed by various functions and leaders within organizations, specifically cybersecurity and IT, risk management and insurance, finance and executive leadership. While all functions have common interests around cyber risks, the report finds that they often act independently. All departments […]

Read More

Open Source Security

How the IT Industry is Securing Open-Source Software

The IT industry and the U.S. government have outlined a 10-step plan to secure open-source software and the IT supply chain.

May 16, 2022 Zachary Comeau Leave a Comment

The IT industry and the U.S. government have outlined a 10-step plan to ensure the security of open-source software and the IT supply chain after a series of supply chain attacks and open-source software vulnerabilities were discovered in recent years. The plan is designed to secure the production of open-source software, improve vulnerability discovery and […]

Read More

Active Directory Misconfigurations

Common Active Directory Misconfigurations That Could Lead to Compromise

Cybersecurity firm Mandiant lays out the 12 most common Active Directory misconfigurations it has seen during 2021.

April 22, 2022 Zachary Comeau Leave a Comment

Cybersecurity services provider Mandiant has released its M-Trends 2022 report, based on data from the company’s investigations between October 2020 and the end of 2021, and it shows that while cyber defenses and techniques are improving, attackers are also continuing to adapt to new trends. Based on the company’s investigations, the report also outlines some […]

Read More

MIcrosoft Okta Lapsus$

What We Know So Far About Okta, Microsoft and Lapsus$

Microsoft and Okta are investigating after Lapsus$ hacking group posts screenshots of purported security incidents.

March 22, 2022 Zachary Comeau Leave a Comment

This article has been amended to reflect an updated statement on the incident from Okta.  After screenshots claiming to stem from security breaches at IT giant Microsoft and identity and authentication provider Okta, both companies are investigating possible attacks from the Lapsus$ hacking group. In statements to various media outlets, the companies say they are […]

Read More

SBOMs

What Needs To Be In An SBOM?

With cybercriminals increasingly leveraging the software supply chain, SBOMs are becoming an important tool. This is what they need to include.

March 15, 2022 Zachary Comeau Leave a Comment

When alleged Russian hackers compromised the SolarWinds Orion platform to spy on U.S. agencies and other high-profile entities, the tech industry renewed its call for the adoption of software bills of materials (SBOM) — an inventory of components that make up the final product. Advocates say that will help give IT and cybersecurity professionals the […]

Read More

Log4J SBOM

Log4j Highlights the Need for a Software Bill of Materials; Here’s How to Create One

Amid the Log4j vulnerabilities, it’s more important than ever that companies prioritize dependency management by creating a SBOM.

January 11, 2022 Bren Briggs, VP of DevOps and Cybersecurity at Hypergiant. Leave a Comment

Just days into the new year and the cybersecurity community is already playing catch up thanks to the recent Log4j vulnerability which illuminated major setbacks in how organizations deal with its own software and open-source packages on which its relies on. In particular, organizations have been caught off guard in auditing its own systems, giving […]

Read More

New Survey Shows Growing Crisis of Trust with Microsoft and Legacy IT Vendors

December 7, 2021 TechDecisions Staff Leave a Comment

CrowdStrike’s fourth Global Security Attitude Survey reveals 63% of organizations are losing trust in legacy vendors such as Microsoft; 96% of organizations that paid a ransom were hit with additional extortion fees SUNNYVALE, Calif.–(BUSINESS WIRE)–CrowdStrike, Inc. (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced the release of […]

Read More

Zero Trust, Leostream, AWS

Research: Zero Trust Expected to Double Cybersecurity Efficacy

Research suggests that IT experts predict zero trust to lead to a 144% increase in anticipated efficacy in stopping data breaches.

December 2, 2021 Zachary Comeau Leave a Comment

If you were having doubts about the efficacy of a zero trust approach to cybersecurity, recently released research suggests that such a network architecture is expected to double the efficacy of cybersecurity products. The research, conducted by Osterman Research on behalf of cybersecurity firm Symmetry Systems, found from a survey of 125 IT and security […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Interim pages omitted …
  • Page 17
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.