• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Microsoft Azure Defender for IoT

Microsoft Releases Azure Defender for IoT in Public Preview

Azure Defender for IoT is designed to help protect and monitor industrial and critical infrastructure that depend on those devices.

October 16, 2020 Zachary Comeau Leave a Comment

Azure Defender for IoT, Microsoft’s cybersecurity solution for IoT and OT devices, has entered public preview to help protect industrial and critical infrastructure that depend on those devices. The new solution incorporates agentless, IOT/OT-aware behavioral analytics from Microsoft’s recent acquisition of CyberX. It addresses these risks by discovering unmanaged assets, identifying vulnerabilities and continuously monitoring […]

Read More

safe remote work strategy, multi-level access

Developing Safe Remote Work Strategies for Multi-Level Access

A safer remote work strategy for multi-level access frameworks requires consistent policy behind access and credentialing controls.

October 14, 2020 Adam Forziati Leave a Comment

Many companies are spending more on cloud infrastructure services than on data center hardware as they move to a cloud-first approach. But how safe are their remote work strategies overall, especially if they’re utilizing a multi-level access framework? According to Marivi Stuchinsky, SVP, Global CTO at Technologent, many businesses are unprepared for IT hardware-related support needs, […]

Read More

CNA Cyber Attack

CISA: Hackers Using Vulnerability Chaining to Target Government Networks

According to U.S. cybersecurity officials, malicious cyber attackers are using multiple vulnerabilities to infiltrate government networks.

October 12, 2020 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency, along with the FBI, have released a joint advisory warning that threat actors are actively exploiting vulnerabilities as they target government networks. The joint advisory, released last Friday, says these recent attacks are directed at federal, state, local, tribal and territorial government networks, and there is some risk […]

Read More

Microsoft Digital Defense Report

Microsoft’s Digital Defense Report Details Increasing Cyber Threats

Microsoft's Digital Defense Report details advanced cyber threats facing the world and sophistication with which hackers and cybercriminals are operating.

September 30, 2020 Zachary Comeau Leave a Comment

A new annual report from Microsoft details the advanced threats and sophistication with which hackers and cybercriminals are attempting to infiltrate our networks and IT systems. The Digital Defense Report, released Tuesday, covers cybersecurity trends from the past year and “makes it clear that threat actors have rapidly increased in sophistication over the past year, […]

Read More

School cyber Attacks

Remote, Hybrid Learning Make Schools Huge Targets for Cyber Attacks

Remote and hybrid learning and new technologies are making schools everywhere a prime target for ransomware and other cyber attacks.

September 10, 2020 Zachary Comeau Leave a Comment

As schools begin to reopen and are increasingly reliant on new technologies, cybercriminals are taking note and are targeting those critical systems with the hopes of a large ransom. That’s exacerbated with some of the country’s largest school districts starting the year fully online, while most others are offering a hybrid model in which half […]

Read More

Cisco Webex

Cisco Warns of Zero-Day Remote Attack Vulnerability

Cisco is warning of a new zero-day vulnerability that impacts the company’s networking equipment’s Internetwork Operating (IOS) System.

September 3, 2020 Zachary Comeau Leave a Comment

Cisco is warning of a new zero-day vulnerability that impacts the company’s networking equipment’s Internetwork Operating (IOS) System. In an advisory, Cisco said multiple vulnerabilities in the Distance Vector Multicast Routing Protocol (DVMRP) feature of the Cisco IOS XR Software could allow an unauthenticated user to remotely exhaust process memory of an affected device. That […]

Read More

Multisensor Camera, Johnson Controls Flex, Tyco Illustra

Johnson Controls Launches New Tyco Illustra Flex Multisensor Camera

Flex multisensor camera comes with a magnetic base that enables each sensor to be independently placed and a three-axis gimbal on each sensor.

September 2, 2020 TechDecisions Staff Leave a Comment

The new Tyco Illustra multisensor camera from Johnson Controls, Flex, is designed to provide a cost-effective solution for monitoring activity over wide spaces, according to the company. The second generation Illustra Flex multi-directional camera is equipped with four separate image sensors which can be individually positioned and angled to provide up to 360° coverage via […]

Read More

airport digital signage, RGB Spectrum Mediawall V

Tampa International LED Airport Digital Signage

An LED airport digital signage rests on a RGB Spectrum Mediawall V system and provides the public and employees with key information.

August 17, 2020 TechDecisions Staff Leave a Comment

Tampa International Airport enlisted the services of AVI-SPL, a global digital workplace services provider headquartered in Tampa, Florida, to design and integrate new public signage throughout the airport’s terminals and parking areas. The Tech Decision The Airport challenged AVI-SPL to come up with a digital solution that makes navigating the airport more engaging, informative and, […]

Read More

Intelligent Assistant Regional Accent Alexa

Research: Alexa Devices Vulnerable to Hacking

Virtual assistants and IoT devices are inherently vulnerable to cyber attacks, including Alexa devices, according to Check Point.

August 13, 2020 Zachary Comeau Leave a Comment

New research from Check Point suggests that Alexa is not as secure as we thought. Alexa, Amazon’s virtual assistant which is becoming a larger presence in the enterprise, is not immune to outside attacks because its subdomains are vulnerable to Corss-Origin Resource Sharing (CORS) misconfiguration and Cross Site Scripting, Check Point researchers wrote. “Using the […]

Read More

COVID-19 Cybersecurity, COVID-19 Cyber attacks

Report: COVID-19 and Remote Work is Leading to Increasing Cyber Attacks

According to a new study from VMWare Carbon Black, the vast majority of businesses have seen an uptick in cyber attacks since the COVID-19 crisis began.

July 22, 2020 Zachary Comeau Leave a Comment

Cybercriminals are an opportunistic bunch and seize on vulnerabilities whenever and wherever they arise. They capitalize on international news and trends, so COVID-19 was a prime opportunity. According to a new cybersecurity study from VMWare Carbon Black, the vast majority of businesses have seen an uptick in attacks since the crisis began and employees started […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.