• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

SquaredUp for Azure, application dashboards
Featured Video Play Icon

SquaredUp Launches 360° Application Dashboards for Microsoft Azure

Data visualization platform SquaredUp for Azure puts Enterprise DevOps teams in control of availability, performance and cost of cloud-hosted applications.

November 4, 2019 TechDecisions Staff Leave a Comment

SquaredUp, a software company and Microsoft partner with enterprise customers worldwide including Credit Suisse, KPMG and Nestle, announces the launch of SquaredUp for Azure, what the company calls “the first 360° application dashboards for Microsoft Azure.” “SquaredUp for Azure solves the challenge of tool sprawl and spiralling cloud costs by offering real-time visibility of costs […]

Read More

Medical Device Security

Gurucul Says Medtech is Increasingly Using Security Software

Security analytics software firm Gurucul says medical device companies should invest in securing their products from cyber attacks.

October 31, 2019 Zachary Comeau Leave a Comment

Devices are being added to the network across every sector, vertical and market you can think of, and one of the most important is the medical device market. That’s creating a dangerous new attack surface, according to behavior-based security and fraud analytics tech firm Gurucul. Earlier this week, the company said its software’s use among […]

Read More

KORE One IoT platform

KORE Introduces New Platform to Enable Innovative IoT Connectivity, Solutions, & Analytics Services

In addition to launching KORE One IoT platform, KORE launches the first two real time services that offer Enhanced Security and Connectivity Management.

October 29, 2019 TechDecisions Staff Leave a Comment

KORE, an IoT business performance company, introduces the KORE One IoT platform and the first two services built on KORE One: SecurityPro and ConnectivityPro. KORE One is an API-based, open-architecture platform that provides “a new approach to IoT solution development,” says the company. KORE One “Its open, modular, and scalable architecture provides a future-proof foundation for […]

Read More

iot security dangers, IoT dangers, IoT device security

Security Risks & Potential Dangers of IoT

IoT device security is a very, VERY complicated topic. Here are some common IoT dangers and how to avoid your network being compromised.

October 8, 2019 Joe Zulick Leave a Comment

The “Internet of Things,” often referred to in its abbreviated form “IoT,” is the result of the inevitable revolution of networking commonly used essential items and appliances such as refrigerators, light switches, cameras, sensors, and other forms of hardware. Even my toothbrush has network functionality via Bluetooth. The term “IoT device” typically references a class […]

Read More

Apple Releases New Policy Aimed at Preventing Online Web Tracking

The WebKit Tracking Prevention Policy from Apple explains the anti-tracking methods the company has developed, and expands on what should be considered harmful methods.

September 13, 2019 Jonathan Blackwood Leave a Comment

The WebKit Tracking Prevention Policy from Apple explains the anti-tracking methods the company has developed, and expands on what should be considered harmful methods.

Read More

Trustwave Fusion Cloud-Based Cybersecurity

Trustwave Fusion Platform Redefines Cloud-Based Cybersecurity

Trustwave Fusion, a cloud native platform, provides visibility over how security resources are provisioned, monitored and managed across any environment.

September 5, 2019 TechDecisions Staff Leave a Comment

Trustwave announces Trustwave Fusion platform “to meet the enterprise where they are today in their operations and in the future as they embrace digital transformation,” the company says. The Trustwave Fusion platform connects the digital footprints of enterprises and government agencies to a security cloud comprised of the Trustwave data lake, analytics, threat intelligence, security services and Trustwave […]

Read More

Def Con Voting Village highlights 2019
Featured Video Play Icon

Def Con Voting Village Highlights: ‘Nyan Cat’ on a Voting Machine; Dire Need for Paper Trails

Def Con Voting Village 2019 provided congressional leaders a look into just how dire the need is for more secure voting machines.

August 29, 2019 TechDecisions Staff Leave a Comment

“Friendly hackers” were given a very clear directive during this year’s Def Con Voting Village, part of the international hacker conference. And they followed through, much to the dismay of visiting U.S. Congresspeople. Their task was to crack open some test voting equipment to see just how secure the electronic poll books and ballot printers […]

Read More

U.S. Wants Encryption Backdoor in Personal Devices

Major technology companies are fighting against U.S. Attorney General William Barr's suggestion that encryption backdoors be installed in personal devices, while users should just accept the risk of this potential mandate.

August 16, 2019 Jessica Messier Leave a Comment

Major technology companies are fighting against U.S. Attorney General William Barr’s suggestion that encryption backdoors be installed in personal devices, while users should just accept the risk of this potential mandate.

Read More

Azure Security Lab, top Azure bug bounty

Microsoft Azure Security Lab Lets Hackers Test for Vulns, Raises Top Azure Bug Bounty

New Microsoft Azure Security Lab lets ethical hackers search for security vulns in Azure and raises the top Azure bug bounty to $40,000.

August 7, 2019 TechDecisions Staff Leave a Comment

Microsoft recently announced the Azure Security Lab, a sandbox for security personnel to test cloud security. Meanwhile, VentureBeat reports the company also doubled the top Azure bug bounty reward to $40,000. What’s the Top Azure Bug Bounty? Bug bounty programs complement internal security and help motivate groups of hackers to find flaws and act as […]

Read More

Hacking

The Biggest Targets of Cyber Attacks and How to Prepare For Them

Christopher Krebs discusses recent phishing incidents, who is affected, and what can be done to prevent cyberattacks in the future.

July 17, 2019 Jessica Messier Leave a Comment

Christopher Krebs discusses recent phishing incidents, who is affected, and what can be done to prevent cyberattacks in the future.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 50
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.