• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Semperis Extends Active Directory Protection With Expansion Into Australia and New Zealand

January 18, 2022 TechDecisions Staff Leave a Comment

New team in the region propels Semperis’ global growth of hybrid identity protection solutions and follows recent expansion into APAC HOBOKEN, N.J.–(BUSINESS WIRE)–Semperis, the pioneer of identity-driven cyber resilience for enterprises, today announced that it is expanding its comprehensive Active Directory (AD) protection, mitigation, and recovery solutions to Australia and New Zealand with a Melbourne-based […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

This is What A Russian Cyberattack Looks Like

In light of recent geopolitical events involving Russia, U.S. agencies release detailed guidance on how to spot a Russian cyberattack.

January 18, 2022 Zachary Comeau Leave a Comment

Many organizations that have valuable data or even come close to touching sectors of the U.S. government are likely fending off cyberattacks from nation-state countries, with Russia among the top such threats. Now, due to increasing tensions between Russia, Ukraine and western countries, IT and cybersecurity professionals should be on the lookout for sophisticated threat […]

Read More

White House AI Regulations, ChatGPT, Generative AI

What Tech Firms Are Saying About The White House’s Open-Source Security Summit

White House's Open-Source Security Summit renews calls for software code transparency and more support for the open-source community.

January 13, 2022 Zachary Comeau Leave a Comment

After the Log4j vulnerabilities threw a wrench into the holiday plans of IT and cybersecurity folks last month, the federal government has taken swift action to address the issue, including instructing federal agencies to quickly patch and mitigate the vulnerability and making other resources available to the larger IT community. Now, the issue has been […]

Read More

Mirantis Brings Secure Registries to any Kubernetes Distribution

January 13, 2022 TechDecisions Staff Leave a Comment

Mirantis Secure Registry 3.0 supports usage across any Kubernetes distribution to help enterprises secure their software supply chain CAMPBELL, Calif.–(BUSINESS WIRE)–#containerregistry—Mirantis, the open cloud company, today announced the release of Mirantis Secure Registry (MSR) 3.0, which supports usage across any Kubernetes distribution. Security is often an afterthought during application development and lifecycle management, leading to […]

Read More

NSA Programming Languages

Honeywell Expands OT Cybersecurity Portfolio With Acalvio Technologies

Honeywell's Threat Defense Platform features autonomous deception technology from Acalvio, providing threat detection for buildings.

January 11, 2022 TD Staff Leave a Comment

Honeywell and Acalvio Technologies have launched a new solution designed to detect known and unknown (zero-day) attacks across the operational technology (OT) environments in commercial buildings. Honeywell Threat Defense Platform (HTDP) powered by Acalvio uses “sophisticated active defense – featuring autonomous deception tactics to outsmart attackers,” providing “high fidelity threat detection,” according to the company. […]

Read More

Microsoft January Patch Tuesday

Admins Have 122 Microsoft Bugs To Patch This Month

IT professionals should prioritize an HTTP Protocol Stack RCE flaw and multiple Exchange Server RCE vulnerabilities.

January 11, 2022 Zachary Comeau Leave a Comment

Microsoft has released patches for nearly 100 vulnerabilities this Patch Tuesday, including three Exchange remote code execution bugs and an HTTP protocol stack remote code execution vulnerability. Despite the unusually large amount of patches to start the year, none are listed as being actively exploited. However, six are listed as publicly known at the time […]

Read More

Proofpoint CISO, CISOs cyberattack

Cyberattacks Increased By 50% In 2021

Researchers with Check Point say cyberattacks in 2021 increased by 50% when compared to 2020.

January 11, 2022 Zachary Comeau Leave a Comment

Not that anyone assumed differently, but cyberattacks proliferated the internet in 2021, with researchers noting 50% more attacks per week on corporate networks compared to 2020, according to cybersecurity firm Check Point. The 2021 data comes just a few months after the company reported in October a 40% increase in cyberattacks globally. However, the fourth […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

A Chinese Ransomware Operator Is Leveraging Log4j Bugs, VMWare Horizon

Ransomware operation leveraging Log4j bugs began attacking internet-facing systems running VMWare Horizon earlier this month, Microsoft says.

January 11, 2022 Zachary Comeau Leave a Comment

The IT and cybersecurity community sounded the alarm last month when researchers discovered vulnerabilities in Log4j, the ubiquitous java logger used by a wide range of tech products. The tool has been patched and vendors are quickly deploying its own patches for products that use the tool, but the situation is not getting much better […]

Read More

Yugabyte Named CVE Numbering Authority

January 11, 2022 TechDecisions Staff Leave a Comment

As a CVE Numbering Authority, Yugabyte Joins a Community of Security Experts to Publish Newly Discovered Vulnerabilities SUNNYVALE, Calif.–(BUSINESS WIRE)–Yugabyte, the leader in open source distributed SQL databases, today announced it has been designated as a CVE Numbering Authority (CNA) by the CVE Program. Yugabyte joins an elite group of public and private sector organizations […]

Read More

Log4J SBOM

Log4j Highlights the Need for a Software Bill of Materials; Here’s How to Create One

Amid the Log4j vulnerabilities, it’s more important than ever that companies prioritize dependency management by creating a SBOM.

January 11, 2022 Bren Briggs, VP of DevOps and Cybersecurity at Hypergiant. Leave a Comment

Just days into the new year and the cybersecurity community is already playing catch up thanks to the recent Log4j vulnerability which illuminated major setbacks in how organizations deal with its own software and open-source packages on which its relies on. In particular, organizations have been caught off guard in auditing its own systems, giving […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.