• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

ISACA Introduces Two New CMMI Courses for Building Safety and Security Capabilities

May 5, 2022 TechDecisions Staff Leave a Comment

SCHAUMBURG, Ill.–(BUSINESS WIRE)–Strengthening the capabilities that keep their organizations safe and secure is a key concern for many enterprises, and ISACA’s Capability Maturity Model Integration (CMMI) has launched two new courses during the ISACA Conference North America this week—Building Security Excellence and Building Safety Excellence—to help them do just that. These courses provide professionals with […]

Read More

Cybersecurity Consolidation, cyber readiness

Why Soon-To-Be Unsupported Windows 2012 and 2012 R2 Servers Pose Serious Corporate, Personal Risk for Execs

Organizations leveraging Windows Server 2012 and 2012 R2 after Oct 2023 will become vulnerable to cyberattacks and compliance risks.

May 5, 2022 Paul Deur Leave a Comment

Microsoft will officially end extended support for Windows Server 2012 and 2012 R2 in October of 2023, meaning the company will stop providing users with critical security updates and patches. Organizations that continue to leverage Windows Server 2012 and 2012 R2 after this date will become increasingly vulnerable to cyber attack and compliance risks. Any […]

Read More

Binarly Partners With immune to Secure Hardware, Firmware and Software Supply Chain

May 3, 2022 TechDecisions Staff Leave a Comment

With firmware attacks becoming more and more complex, partnership creates a unique, next-generation solution capable of detecting known and unknown threats in multiple firmware components across devices. PASADENA, Calif.–(BUSINESS WIRE)–#firmware–Binarly Inc. and immune, GmbH have entered into a strategic partnership to deliver the most comprehensive device security solution to protect customers against hardware, firmware and […]

Read More

Network Perception Secures $13 Million Series A Funding Round

May 3, 2022 TechDecisions Staff Leave a Comment

Leader in OT Network Security Expands to Meet the Cybersecurity Needs of Critical Infrastructure Industries CHICAGO–(BUSINESS WIRE)–#OT–Network Perception, innovators of operational technology (OT) solutions which protect mission-critical assets, announced today that it has raised $13 million in Series A financing. The funding round was led by The Westly Group with participation from Energy Impact Partners […]

Read More

Microsoft Security RSA Conference

Microsoft Defender For Business Is Now Generally Available

Microsoft Defender for Business brings enterprise-grade endpoint security, detection and response to smaller organizations.

May 2, 2022 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of the stand-alone version of Microsoft Defender for Business, a new offering designed for small-to-mid-sized businesses that brings enterprise-grade endpoint security, detection and response to smaller organizations. According to Microsoft, this is designed to provide protection against ransomware and other sophisticated cyberattacks for SMBs, who say cyberthreats are becoming […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks.

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

12 Threat Detection Trends IT Pros Should Know

Red Canary's 2022 Threat Detection Report covers the most prominent trends of 2021, and shows major themes that may prelude 2022.

April 29, 2022 TD Staff Leave a Comment

Red Canary, the Denver-based managed detection and response (MDR) provider performed an analysis of emerging and significant trends that its cybersecurity team encountered over the past year. Its annual 2022 Threat Detection Report covers the most prominent trends of 2021 and shows major themes that may prelude into 2022. Last year,  ransomware groups (Sodinokibi/REvil, BlackMatter, […]

Read More

Hybrid Work security

The Great Resignation and Hybrid Work are Changing the Security Landscape

Supporting a remote/hybrid work environment complicates IT environments— Here are a few tips for employers to remain hypervigilant in their security practices.

April 29, 2022 Jimmy Chang Leave a Comment

Record numbers of Americans are quitting their jobs in what many are now calling the “Great Resignation.” Remaining employees who have had an opportunity to prove their value and ability to work productively from anywhere are placing intense pressure on their employers to support a remote/hybrid work environment. Gartner recently stated that “51% of global knowledge workers will be […]

Read More

Fidelis Cybersecurity Active XDR Platform Expands to Open XDR

April 26, 2022 TechDecisions Staff Leave a Comment

Faster, Stronger Detection, Deception and Response Quickly Neutralizes Advanced Threats BETHESDA, Md.–(BUSINESS WIRE)–#Cybersecurity–Fidelis Cybersecurity, the industry innovator in Active eXtended Detection and Response (XDR) solutions trusted by Fortune 100 firms and government organizations worldwide, announced a more robust and open XDR platform with improvements to its leading Network Detection and Response (NDR) and Deception solutions. […]

Read More

insider threats, military document leak, Jack Teixeira, insider risk

Insiders Pose Cybersecurity Threat to Healthcare

The average cost for credential theft was more than $871,000 for each incident associated with an insider, warns HHS.

April 26, 2022 TD Staff Leave a Comment

The U.S. Department of Health and Human Services (HHS) Cybersecurity Program Office of Information Security warned healthcare facilities on Thursday about vulnerabilities to insider threats. HHS cited a 2020 study from Ponomon, which found that 61% of data breaches involving an insider are primarily unintentional, caused by negligent insiders. Nearly 14% of breaches, however, are […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.