• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

Sophos Cybersecurity Trends

Warren Wants To Combat Insecure and Inefficient Elections

With a tax on the extremely wealthy, Warren wants to fund a complete overhaul of outdated American election infrastructure.

July 16, 2019 Sam Harton Leave a Comment

With a tax on the extremely wealthy, Warren wants to fund a complete overhaul of outdated American election infrastructure.

Read More

Threat Runner from HORNE Cyber Allows Testing of Network Response to Malware

HORNE Cyber has launched Threat Runner, a software that allows organizations of any size to safely test how their networks will respond to real malware like Wannacry, Satan and Cerber.

July 5, 2019 TechDecisions Staff Leave a Comment

HORNE Cyber has launched Threat Runner, a software that allows organizations of any size to safely test how their networks will respond to real malware like Wannacry, Satan and Cerber.

Read More

One Day, Your Fingerprints Might Be Housed on Amazon’s Cloud – Here’s How

The Homeland Security Department is looking to upgrade its biometrics detection software, and eventually store that data on Amazon’s cloud.

July 1, 2019 Jessica Messier Leave a Comment

The Homeland Security Department is looking to upgrade its biometrics detection software, and eventually store that data on Amazon’s cloud.

Read More

data leak

Data Leak Exposes 85GB of Security Logs of Major Hotel Chains

The Pyramid Hotel Group experiences data leak, leaving Marriott and several other hotels at risk.

June 28, 2019 Lisa Montgomery Leave a Comment

The Pyramid Hotel Group experiences data leak, leaving Marriott and several other hotels at risk.

Read More

smb cloud security, SMBs, smb security risks

IoT Growth is Great, But It’s Causing SMB Security Risks

SMB security risks are more numerous in this age of IoT expansion. Here are the most prominent challenges to security caused by new developments in tech.

June 26, 2019 Terry Hearn Leave a Comment

As small businesses continue to battle traditional issues of time and resources, the rapid growth of the Internet of Things (IoT) is adding SMB security risks for teams to manage. While there are certainly many benefits to implementing IoT in terms of efficiency and logistics, such a rapid growth in the number of endpoints connected to […]

Read More

cyber security

Indegy Offers Cloud-based Industrial Cyber Security as a Service (ICSaaS)

New version of cyber security suite also provides real-time threat intelligence sharing for any size business.

June 25, 2019 Lisa Montgomery Leave a Comment

New version of cyber security suite also provides real-time threat intelligence sharing for any size business.

Read More

biggest data breaches, data breaches list, data breaches and hacks

The 5 Biggest Data Breaches in 2019 So Far (And How They Could Have Been Prevented)

These are the biggest data breaches and hacks so far in 2019 – how could they have been stopped? We dig deeper to find out.

June 20, 2019 Adam Forziati Leave a Comment

IBM says in a study that the cost of lost business after a breach for US organizations is $4.2 million. It is evident, then, that the organizations involved in the 5 biggest data breaches in 2019 thus far will likely suffer a considerable economic blow.   But if you read this data breaches list thinking, “these are mega-companies; the risk of a data […]

Read More

Essentials as a Service, EaaS

‘Essentials As a Service,’ Or Why EaaS Is the Acronym to Look For Going Forward

Odds are, you're working on an even tighter-than-usual budget, so leverage limited resources like Essentials as a Service (EaaS) to stay competitive.

June 5, 2019 Stephen Vandegriff Leave a Comment

As part of your digital transformation strategy, you’ve made the decision to move key applications, even mission critical parts of your business, to the cloud…for all the right reasons. It’s the key to creating a more agile, responsive and competitive IT organization; a highly efficient and effective environment where finite resources are able to focus […]

Read More

Week in Review: the Convergence, SOAR, Data Breaches, etc.

This week, May 20th-24th, 2019: the impact of the AV and IT convergence, SOAR technology for security admins, robots picking apples, and more.

May 24, 2019 Jonathan Blackwood Leave a Comment

This week, May 20th-24th, 2019: the impact of the AV and IT convergence, SOAR technology for security admins, robots picking apples, and more.

Read More

Intel’s chip-making deal

University of Michigan’s MORPHEUS Chip Encrypts 20 Times Per Second

The university’s hacker-resistant development changes code and seals off network vulnerabilities faster than ever.

May 23, 2019 Jessica Messier Leave a Comment

The university’s hacker-resistant development changes code and seals off network vulnerabilities faster than ever.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.