• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

cybersecurity mesh architecture CSMA, ZTA

Building a Foundation for Zero Trust with Cybersecurity Mesh

A cybersecurity mesh architecture (CSMA) goes beyond ZTA and suggests a deeper, better integrated layer of security.

August 31, 2022 Wes Wright Leave a Comment

It seems like there are more acronyms, labels and methods for bolstering security than ever before – and making sense of them all is proving to be just as complex as the infrastructure they’re meant to secure. One widely embraced term, zero-trust architecture (ZTA), calls for continually vetting users as they access different applications and […]

Read More

Spectrum Enterprise, Cisco

How to Implement a Third-Party Cyber Risk Management Program

CyberGRX explains the importance of implementing a TPCRM program and how your organization can get started, particularly when working with a hybrid workforce.

August 24, 2022 Sarah Frazier Leave a Comment

The COVID-19 pandemic introduced swift digital changes that created further security vulnerabilities for a hybrid workforce. Due to the distributed nature of modern work environments, businesses must be on the lookout for ways that cybercriminals can expose new vulnerabilities. In today’s economy, the need to construct a third-party cyber risk management program  (TPCRM) program for […]

Read More

Microsoft Apple macOS bug

Patch Now: Apple Releases Fixes for Two Actively Exploited Zero-Day Bugs

Apple has discovered two actively exploited zero-day vulnerabilities that could give attackers full access to a wide range of Apple devices.

August 19, 2022 Zachary Comeau Leave a Comment

Apple has discovered two actively exploited zero-day vulnerabilities that could give attackers full access to a wide range of Apple devices, prompting the company to release security updates and urging users to apply the fixes immediately. According to Apple, the two zero-day out-of-bounds write bugs affect iPhone 6s and later, all iPad Pro models, iPad […]

Read More

This Week in IT, IT News, Microsoft, Google, Dell

This Week in IT: Google Meet, Cisco Attack, Ransomware, IT Spending

Google Meet updates, a sophisticated phishing attack against Cisco, IT spending and other cybersecurity items highlight this week's IT news.

August 11, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. New Google Meet live-sharing features As […]

Read More

Tenable Cloud Security with Agentless Assessment and Live Results

Tenable Announces Cloud Security Agentless Assessment for Faster Detection

Tenable Cloud Security Agentless Assessment paired with Tenable Cloud Security Live results can help organizations remediate zero days faster.

August 10, 2022 Zachary Comeau Leave a Comment

Vulnerability management software provider Tenable is introducing Tenable Cloud Security Agentless Assessment paired with Tenable Cloud Security Live results to help organizations remediate vulnerabilities faster and prevent zero-day bugs from being exploited. This unifies the company’s cloud security posture and vulnerability management tools into a single, agentless solution designed to help customers address the critical […]

Read More

1Passsword 8 for iOS and Android

1Password Rolls Out New iOS, Android Platform

1Password 8 for iOS and Android is designed to enable seamless security for users from whichever device they prefer.

August 10, 2022 Zachary Comeau Leave a Comment

Password manager 1Password has released 1Password 8 for iOS and Android, a new mobile platform designed to streamline productivity and security protections and bring more feature parity between desktop and mobile apps. The company bills 1Password 8 for iOS and Android as the completion of the 1Password 8 roll-out across all supported devices and a […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Modern Cyber Threats, Supply Chain Attacks Are Burning Out IT Pros, Experts Say

The constantly shifting IT landscape is breeding more cyberattacks, leading to burnout. Applying psychology concepts to the industry may help.

August 9, 2022 Zachary Comeau Leave a Comment

The software supply chain and our increasing reliance on cloud infrastructure is making protecting IT environments more challenging and leading to cybersecurity burnout among IT  professionals, according to a panel of cybersecurity experts held last week in advance of Black Hat USA this week. Attackers are increasingly leveraging the software supply chain and open-source software […]

Read More

VMware DEX

VMware Launches Carbon Black Workload for AWS

Carbon Black Workload for AWS is designed to bring advanced protection to both traditional and modern workloads via a single unified console.

August 8, 2022 Zachary Comeau Leave a Comment

VMware has launched Carbon Black Workload for AWS to bring advanced protection designed for securing both traditional and modern workloads via a single unified console. According to the Palo Alto, Calif.-based company, Carbon Black Workload for AWS uses a single unified console that integrates into an existing infrastructure that allows IT and security teams to […]

Read More

CISO Burnout

Cybersecurity Burnout Persists as Attack Landscape Shifts

As new cyberattack trends continue to emerge, burnout among cybersecurity teams remains a critical issue, according to VMware report.

August 8, 2022 Zachary Comeau Leave a Comment

As new cyberattack trends continue to emerge, burnout among cybersecurity teams remains a critical issue, according to VMware’s new Global Incident Response Threat Report. The Palo Alto, Calif.-based company’s report, issued during Black Hat USA 2022, details how the “ceaseless wave of cyberattacks,” pandemic disruptions and a constantly shifting threat landscape is causing nearly 47% […]

Read More

Vulnerability Dahua ONVIF

Vulnerability Discovered in Dahua’s ONVIF Implementation

The vulnerability could be abused by attackers to access Dahua cameras with full privileges, including watching live video footage.

August 5, 2022 TD Staff Leave a Comment

Cybersecurity firm Nozomi Networks recently revealed it had discovered a new vulnerability affecting the implementation of an Open Network Video Interface Forum (ONVIF) authentication mechanism in some IP cameras developed by Dahua Technology. According to a blog post by the cyber experts, this vulnerability could be abused by attackers to compromise Dahua network cameras by sniffing a […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.