• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

CrowdStrike Falcon Pro for Mac Achieves 100% Malware Protection, Wins Fifth AV-Comparatives Approved Mac Security Product Award

June 28, 2022 TechDecisions Staff Leave a Comment

Award validates CrowdStrike’s industry leadership in proactively protecting customers against today’s most advanced attacks AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced CrowdStrike Falcon Pro for Mac has won a fifth consecutive Approved Security Product award from leading independent testing organization AV-Comparatives, achieving the […]

Read More

Cyber technology security lock on screen, network protection

Why Security Technology Convergence is Crucial to Future-Proofing the Workplace

When it comes to maintaining the security of workplace IT and technology systems, a holistic approach to physical and cybersecurity can help teams create a more robust security posture.

June 28, 2022 Andi Krebs Leave a Comment

Today’s commercial technology stacks are increasingly leveraging IoT and the cloud to make managing businesses more efficient: people are more reliant on technology in order to use, access, and manage their offices. This trend holds true for workplace security systems, too. Now, we’re seeing higher mobile credential adoption for commercial access control systems, increased migration […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Log4Shell Exploitation Continues, Agencies Warn

Multiple hacking groups are leveraging the vulnerability in the ubiquitous Log4J tool six months after it was first discovered, CISA says.

June 24, 2022 Zachary Comeau Leave a Comment

More than six months after the Log4Shell vulnerability was discovered in the widely used Java logger Log4j, cybersecurity agencies are warning of the continued exploitation of the bug in unpatched VMWare Horizon and Unified Access Gateway servers. The U.S. Cybersecurity and Infrastructure Agency (CISA), along with the U.S. Coast Guard Cyber Command (CGCYBER), say malicious […]

Read More

Global Survey of 1,400+ IT Leaders Finds That Elastic Helps Organizations Increase Profitability and Growth

June 23, 2022 TechDecisions Staff Leave a Comment

Company’s First Results That Matter Customer Value Study Reveals Key Business Value Drivers  Driving profitability while reducing costs 68% through tool consolidation Simplifying solution management in the cloud and reducing data center overhead costs by 71% Improving customer and employee satisfaction by 69% Increasing application and service resilience through a 66% improvement in mean time […]

Read More

3CX Hack Supply Chain attack compromise

IT Security Experts Should Pay Close Attention To What’s Happening in Ukraine

The conflict between Russian and Ukraine and the advanced cyberattacks being launched should concern everyone, experts say.

June 22, 2022 Zachary Comeau Leave a Comment

If the last few years are any indication, cybercriminals will continue adopting new tactics and techniques to find ways past our network defenses, and that was on display in full force at RSA Conference earlier this month, where cybersecurity experts shared what they’re seeing in the wild. The annual cybersecurity conference was held at a […]

Read More

Veza, the Data Security Platform Built on the Power of Authorization, Announces Blackstone as a Customer and Strategic Series C Investor

June 22, 2022 TechDecisions Staff Leave a Comment

Blackstone, the world’s largest alternative asset manager, has selected Veza to manage data security for its global organization across a complex, hybrid-cloud environment PALO ALTO, Calif.–(BUSINESS WIRE)–#accessgovernance–Veza, the data security platform built on the power of authorization, announced an investment in their Series C funding round from Blackstone Innovations Investments, along with participation from previous […]

Read More

Microsoft Fortra healthcare ransomware

Tenable: Ransomware-as-a-Service is Booming

A new report from Tenable details the lucrative ransomware industry and how cybercrime has matured into a business-like ecosystem.

June 22, 2022 Zachary Comeau Leave a Comment

The subscription economy adopted by the software industry is growing ransomware from what was once a fledgling threat to an IT security crisis as ransomware groups continue to pad their wallets and grow the ransomware-as-a-service economy, according to a new report from Tenable. According to the Maryland-based vulnerability management software company, that service model is […]

Read More

Buildings IOT Releases IOT Jetstream to Expand Access to Building Data for Application Developers Working in the Smart Buildings Industry

June 15, 2022 TechDecisions Staff Leave a Comment

The smart building integration platform brings building systems, equipment, and business applications together via a modern GraphQL API. CONCORD, Calif.–(BUSINESS WIRE)–As application developers begin to see smart buildings as a promising frontier for innovation, Buildings IOT has created IOT Jetstream. This reliable, secure building integration platform makes it possible to access a myriad of data […]

Read More

MIcrosoft Entra External ID

June 2022 Patch Tuesday: Follina Included in 60 Microsoft Bug Patches

Microsoft’s June 2022 Patch Tuesday release includes a fix for Follina and 59 other bugs in Windows and Windows components.

June 14, 2022 Zachary Comeau Leave a Comment

Despite issuing patches for just 60 security bugs this month, Microsoft’s June Patch Tuesday release include a fix for Follina, a dangerous remote code execution zero-day in the company’s Windows Support Diagnostic Tool that is being actively exploited. According to Microsoft, attackers who successfully exploit the bug, tracked as CVE-2022-30190, can run arbitrary code with […]

Read More

RSA 2022

Five Takeaways From RSA Conference 2022

Although smaller due to the COVID-19 pandemic, the 2022 RSA Conference marked the most important year of the event yet.

June 14, 2022 Zachary Comeau Leave a Comment

Although it was a noticeably smaller crowd and trade show floor than previous shows, the 31st annual RSA Conference marked arguably the most important version of the show as IT and security professionals were eager to learn about what the cybersecurity industry is doing to help protect their organizations. According to conference officials, the event […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.