• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Cybersecurity Risk

Report: Iranian Hacking Group Exploiting VPN Vulnerabilities

Cybersecurity experts say a hacking group suspected to be an Iranian state-sponsored entity is selling access to compromised corporate networks.

September 3, 2020 Zachary Comeau Leave a Comment

Cybersecurity experts say a hacking group suspected to be an Iranian state-sponsored entity is selling access to compromised organization networks. The group, code named Pioneer Kitten, has been active since at least 2017 and is focused on gaining and maintaining access to entities possessing sensitive information of likely intelligence interest to the Iranian government,” cybersecurity […]

Read More

Microsoft Patch Tuesday

Microsoft Issues Fixes for 129 Vulnerabilities in Patch Tuesday Release

Microsoft has released fixes for 129 vulnerabilities in what was some are calling the largest patch Tuesday in the history of the Windows operating system.

June 10, 2020 Zachary Comeau Leave a Comment

Microsoft has released fixes for 129 vulnerabilities in what was some are calling the largest patch Tuesday in the history of the Windows operating system. However, none of the bugs addressed in this months’ updates are known to have been exploited or known prior to the release, but there are some that warrant special attention […]

Read More

2020 Global IoT/ICS Risk Report, control system vulnerabilities

‘Alarming’ Prevalence of IoT and Industrial Control System Vulnerabilities in Real-World Network Study

Control system vulnerabilities study explains why orgs are susceptible to downtime, safety incidents & theft of intellectual property.

October 25, 2019 TechDecisions Staff Leave a Comment

IoT and industrial control system vulnerabilities are “alarming” in their rampant state, says a report by CyberX called “2020 Global IoT/ICS Risk Report.” The data illustrates that IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property, the […]

Read More

Proofpoint CISO, CISOs cyberattack

Assess Your Cyber Risks and Vulnerabilities

Your organization may be vulnerable to cyber risks as a result of systems being installed on or adjacent to the network. Here are some considerations for assessing cyber risks.

February 27, 2019 Paul Konikowski Leave a Comment

Most of these vulns can be patched by updating the firmware, securing the network, and/or enabling the passwords on the devices. But uncovering and patching these device vulnerabilities is only one aspect of securing AV installations.

Read More

Fake Fingerprints Show Vulnerabilities in Security Measures

A group of researchers at NYU developed artificial fingerprints that were able to closely match real ones, demonstrating a possible weakness in fingerprint security methods.

December 5, 2018 Sam Harton Leave a Comment

A group of researchers at NYU developed artificial fingerprints that were able to closely match real ones, demonstrating a possible weakness in fingerprint security methods.

Read More

Cisco acquisitions

Why Cisco’s Recently Detected Vulnerabilities Are a Good Thing for Decision Makers

Even though Cisco found three vulnerabilities in its backend, the steps it took to find them is a good reminder that audits are important.

June 6, 2018 Jessica Messier Leave a Comment

Even though Cisco found three vulnerabilities in its backend, the steps it took to find them is a good reminder that audits are important.

Read More

Cyber Security

Researchers Hope This Bug-Mining Tool Will Combat Network Vulnerabilities

Red Balloon’s “n-days” tool aims to find network vulnerabilities and improve them before hackers attempt a digital break in.

February 7, 2018 Jessica Messier Leave a Comment

Red Balloon’s “n-days” tool aims to find network vulnerabilities and improve them before hackers attempt a digital break in.

Read More

2 Cyberthreat Vulnerabilities Colleges Need to Worry About This School Year

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

September 10, 2015 TD Staff Leave a Comment

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

Read More

Security & IT

How Security Integrators Can Reach IT Decision-Makers More Effectively

As IT takes a lead in security tech decisions, integrators must address cybersecurity, compliance and interoperability to gain buy-in early.

February 1, 2026 Alex Halliday Leave a Comment

Editor’s Note: Another version of this article originally appeared on our sister-site Security Sales & Integration on January 28, 2026. It has since been updated for My TechDecisions’ audience. More system integrators are beginning to recognize that IT departments hold greater influence over technology investments that were once managed solely by security teams, particularly when […]

Read More

BenQ InstaShow

BenQ InstaShow WDC15: A Hands-On Review

The BenQ InstaShow WDC15 offers 4K screen mirroring with no software, minimal latency and robust security for classrooms and meetings.

January 20, 2026 Dan Ferrisi Leave a Comment

The BenQ InstaShow WDC15 offers 4K screen mirroring with no software, minimal latency and robust security for classrooms and meetings.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.