• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Microsoft January Patch Tuesday

What IT Pros Need To Know About The PrintNightmare Vulnerability

IT administrators are being warned of a new actively exploited and unpatched remote code execution vulnerability in Windows Print Spooler.

July 2, 2021 Zachary Comeau Leave a Comment

IT administrators are being warned of an actively exploited remote code execution vulnerability in Windows Print Spooler that could allow an attacker to install programs, view or change data or create new accounts with full user rights. The vulnerability is being referred to as PrintNightmare (CVE-2021-34527), which Microsoft says is slightly different from another vulnerability […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast Episode 126: Managing Cybersecurity Stress

Chris Loehr, executive vice president of Austin, Texas-based MSSP Solis Security, about how to manage stress in today's hectic cybersecurity climate. 

April 23, 2021 Zachary Comeau Leave a Comment

Chris Loehr, executive vice president of Austin, Texas-based MSSP Solis Security, about how to manage stress in today’s hectic cybersecurity climate. 

Read More

Big Tech NSO Group

Microsoft, Google, Other Big Tech Firms Join Legal Fight Against Hacking Company NSO Group

Microsoft, Google, Cisco, VMWare, LinkedIn and GitHub are joining Facebook in a legal fight against Israeli spyware vendor NSO Group.

December 22, 2020 Zachary Comeau Leave a Comment

A Big Tech team of Microsoft, Google, Cisco, VMWare, LinkedIn and GitHub are joining Facebook in a legal fight against spyware vendor NSO Group, alleging the group enables its customers to break into computers, phones and other connected devices. In a blog on Monday, Microsoft’s Corporate Vice President for Customer Security and Trust Tom Burt […]

Read More

SolarWinds Hack

Why The IT Community Should Be Concerned About The SolarWinds Hack

There is still much we're learning about the SolarWinds hack, but one thing is clear: the IT security community got outplayed.

December 22, 2020 Zachary Comeau Leave a Comment

It’s being called the most devastating cyber attack on the U.S., and there’s still so much we don’t know about the SolarWinds supply chain hack, how attackers were able to compromise one of the software leaders in the IT space, what other tools could be compromised and just how much damage has been done to […]

Read More

Email Attacks

The ROI of Cloud-Based Email

Moving your email services to the cloud can bring considerable ROI and free up your IT department to focus and spend on other important projects.

December 15, 2020 Zachary Comeau Leave a Comment

For years, organizations have been migrating their core technology services to the cloud for increased convenience, mobility and cost savings, and the same is true for cloud-based email services. Paying a fixed monthly cost for cloud-hosted email represents a far better and most cost-effective solution than paying for the installation, maintenance, upkeep and security of […]

Read More

GE medical devices

Some GE Medical Devices Could Expose Patient Data, Researchers Say

Vulnerable GE medical devices are used for CT scans, MRIs, mammograms, ultrasounds and positron emission tomography, and may risk patient data.

December 10, 2020 Guest Authors Leave a Comment

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) issued a warning to hospitals about dozens of GE medical devices, including imaging and ultrasound products. According to CISA, an authentication flaw in them poses a serious risk to protected health information. “A successful exploitation could expose sensitive data such as a limited set […]

Read More

World Password Day

Microsoft: Move Away From Phone-based Multi-factor Authentication

Microsoft’s Director of Identity Security Alex Weinert suggests organizations should avoid using vulnerable mobile phone-based authentication methods.

November 12, 2020 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) – a  cybersecurity measure that grants access to an account or application only after a user presents two or more pieces of evidence to prove they own the account – is often cited by experts as a simple but necessary protocol to protect against phishing attacks. Users can usually select a few […]

Read More

Sternum detection system

Sternum Detection System Provides Real-Time Visibility into Security and Analytics of IoT Devices

Sternum detection system enables IoT device manufacturers to have visibility into their entire device fleet in real time.

October 27, 2020 TechDecisions Staff Leave a Comment

Sternum, the IoT cybersecurity company providing embedded protection and real-time visibility for connected devices, announces the launch of its Advanced Detection System (ADS), an agentless data analytics solution that can be embedded onto IoT devices. 40 billion IoT devices are predicted to be in use by 2025, yet until now, manufacturers have had to rely on agent-based solutions, which are resource-heavy. Sternum offers an agentless monitoring […]

Read More

employee data access

Schools Have to Address These Distance Learning Cybersecurity Threats

As administrators struggle to ensure connectivity and accessibility, many aren’t addressing distance learning cybersecurity threats.

October 22, 2020 TechDecisions Staff Leave a Comment

Perhaps no single industry has struggled to adjust more to COVID-19 than education. The pandemic has greatly accelerated the broad adoption of e-learning solutions. Those school districts that invested in robust IT systems have been validated and are continuing to build out their resources. Meanwhile, those districts that did not already have e-learning technologies in […]

Read More

adaptive IR cameras

Johnson Controls Tyco Illustra Essentials Line Debuts 4 New Adaptive IR Cameras

Essentials models include mini-dome, varifocal mini-dome, bullet and varifocal bullet cameras, all featuring adaptive IR.

October 20, 2020 TechDecisions Staff Leave a Comment

New adaptive IR cameras from Johnson Controls include four new models in the Tyco Illustra Essentials IP camera range. The new fourth generation Essentials mini-dome, varifocal mini-dome, bullet and varifocal bullet cameras, which supersede their respective older models, are all equipped with built-in adaptive IR illumination which enables them to capture up to two megapixel […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 45
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.