• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Proofpoint CISO, CISOs cyberattack

Supply Chain Attacks Highlight Why You Should Continue to Be Careful with Third-Party Providers

New attacks, growing public awareness, and increased oversight from regulators is highlighting the growing trend of supply chain attacks.

November 4, 2021 Chris Martin Leave a Comment

It is nearly one year since we saw a nation-state attack on the SolarWinds network management system that compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security. With costs likely to run into the billions, the breach was one of the biggest incidents in recent years with […]

Read More

Juniper Networks Extends AI-Driven Support to Entire Junos Portfolio to Streamline Operator Efficiencies and Maximize End User Experiences

November 2, 2021 TechDecisions Staff Leave a Comment

Holistic and actionable insights lower operational costs while maximizing network uptime SUNNYVALE, Calif.–(BUSINESS WIRE)–Juniper Networks (NYSE: JNPR), a leader in secure, AI-driven networks, today announced a new support solution driven by artificial intelligence that delivers holistic visibility and insights across its entire Junos portfolio. As a cornerstone of its experience-first networking vision and expanding upon […]

Read More

Sonrai Security Joins Microsoft Intelligent Security Association; Sonrai Dig Listed as Preferred Solution on Microsoft Azure Marketplace

November 1, 2021 TechDecisions Staff Leave a Comment

Sonrai Insights and Integrations with Azure Sentinel allows users to enforce and eliminate configuration, identity and data risks NEW YORK–(BUSINESS WIRE)–Sonrai Security, an established leader in enterprise cloud security, strengthens its relationship with Microsoft by joining the Microsoft intelligent Security Association (MISA) for integrations with Microsoft Azure services. Sonrai Security enables customers to continuously secure […]

Read More

EC-Council Launches a Free Entry-Level Cybersecurity Series, the Essentials Series

October 27, 2021 TechDecisions Staff Leave a Comment

EC-Council’s Academic Division has launched the Essentials Series, making critical cybersecurity education across network defense, ethical hacking, and digital forensics accessible for everyone. TAMPA, Fla.–(BUSINESS WIRE)–#ECCouncil–EC-Council, the owners and creators of the Certified Ethical Hacker (CEH) program and several other highly regarded cybersecurity certifications, today unveiled a new pivotal strategy to prepare entry-level cybersecurity professionals. […]

Read More

 A Look Ahead to 2022: McAfee Enterprise & FireEye Predict Top Cyber Threats

October 27, 2021 TechDecisions Staff Leave a Comment

  SAN JOSE, Calif.–(BUSINESS WIRE)–McAfee Enterprise and FireEye today released its 2022 Threat Predictions, examining the top cybersecurity threats they predict enterprises will face in 2022. Bad actors have taken note of successful tactics from 2021, including those making headlines tied to ransomware, nation states, social media and the shifting reliance on a remote workforce. […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

SolarWinds Hackers Are Targeting IT Services Providers and Their Customers

Microsoft says the same Russian group behind the SolarWinds attacks is targeting IT service providers and their to customers' networks.

October 25, 2021 TD Staff Leave a Comment

Microsoft says the same Russian hacking group behind the compromise of the SolarWinds Orion platform is targeting IT service providers and cloud technology resellers to leverage their privileged access to end customer networks. In a series of blogs, Microsoft says the threat actor it calls Nobelium is targeting cloud service providers, managed service providers and […]

Read More

SecurID Innovations Advance Zero Trust Security and Protect Hybrid Workforces

October 18, 2021 TechDecisions Staff Leave a Comment

SecurID Governance and Lifecycle Cloud delivers a full-featured, high-performing governance and lifecycle solution from the cloud, providing immediate business value See this Data Sheet or watch this video for more information on SecurID Governance and Lifecycle Cloud BEDFORD, Mass.–(BUSINESS WIRE)–SecurID, the trusted identity platform and an RSA business, today announced innovations that empower security-sensitive organizations […]

Read More

Featured Video Play Icon

This Illinois High Schooler Rickrolled His School District By Hacking An IPTV Network

October 14, 2021 Zachary Comeau Leave a Comment

If you have ever thought about the many IoT devices that live on networks at your organization, you should seriously look into the security of those products and segment those networks. At the very least, change the default passwords. That’s the lesson an Illinois high school district learned when a student hacked into his school’s […]

Read More

backup storage security

Is Your Organization Adequately Protecting Itself From Ransomware?

With the rise in ransomware, organizations are considering ways to back up their data, according to Hornetsecurity survey.

October 13, 2021 Alyssa Borelli Leave a Comment

One of the most common cyberthreats impacting IT Professionals around the world is ransomware, a malicious program made for devices to lock data from users unless they pay a ransom. At least one in five organizations have fallen victim to a cyberattack, while almost one in ten were forced to pay a ransom to recover […]

Read More

U.S. Healthcare’s “Last Mile” is Open to Attack, New Study Finds; Approov Rolls Out FHIR Guard, Free End-Point Security for FHIR API Providers

October 13, 2021 TechDecisions Staff Leave a Comment

In “Playing With FHIR” Report, Cybersecurity Researcher Alissa Knight Reveals Major “Last Mile” EHR Security Issues in Healthcare Apps – Millions of Patient Records are Exposed. SAN JOSE, Calif. & EDINBURGH, U.K.–(BUSINESS WIRE)–#API—Approov, creators of advanced API threat protection solutions, today issued new research findings in, “Playing with FHIR – Hacking and Securing FHIR APIs,” […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.