• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: zero trust

AWS Amazon Security Lake

AWS Launches Verified Access for VPN-less Secure Remote Access

AWS Verified Access is built using Zero Trust Security principles and leverages multiple security inputs to grant access to applications.

December 1, 2022 Zachary Comeau Leave a Comment

Amazon Web Services (AWS) is launching the preview of AWS Verified Access, a new secure connectivity service designed to allow employees to enable local or remote secure access for corporate applications without a VPN. The company says Verified Access is built using the AWS Zero Trust Security principles and leverages multiple security inputs to grant […]

Read More

Twitter phishing, security, cybersecurity

Beware of Twitter Phishing Scams As Musk Takeover Unfolds

Cybersecurity experts are warning of significant security risks stemming from organizational changes at Twitter.

November 16, 2022 Zachary Comeau Leave a Comment

With Twitter constantly in the news due to large-scale shifts in the social media company’s strategy after the takeover of Elon Musk, cybersecurity professionals are warning of new phishing scams and security risks as the new story continues to play out. Billionaire and CEO of Tesla and SpaceX Elon Musk finalized his $44 billion acquisition […]

Read More

Blueprint Series Cover: What works for hybrid work

Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

November 11, 2022 TD Staff Leave a Comment

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Read More

MIcrosoft Entra External ID

Microsoft Sounds the Alarm on Nation-state Attacks, Cybercriminals and IoT Threats

Microsoft's Digital Defense Report suggests cybersecurity will remain a critical IT investment as bad actors continue to shift strategies.

November 7, 2022 Zachary Comeau Leave a Comment

Nation-state cyberattacks targeting critical infrastructure are rising as countries continue to leverage technology to carry out advanced cyberattacks in addition to physical warfare, according to Microsoft’s latest Digital Defense Report. Much of the report focuses on the ongoing Russian war against Ukraine—which Microsoft attributes as a main cause of a spike in cyberattacks targeting critical […]

Read More

RSA Mobile Lock

RSA’s Mobile Lock Can Detect Critical Threats on Mobile Devices

RSA is launching Mobile Lock, a new mobile security solution designed to detect critical threats and restrict users from authenticating into secure systems.

October 26, 2022 Zachary Comeau Leave a Comment

RSA is launching Mobile Lock, a new mobile security solution designed to detect critical threats on mobile devices and restrict users from authenticating into secure corporate systems. According to the Bedford, Mass.-based provider of identity and access management, RSA Mobile Lock can prevent a threat from expanding beyond a compromised mobile device to other users, […]

Read More

Phishing Success rates

New Phishing-Resistant Solutions, Security Key Integrations in Azure AD

Microsoft new phishing-resistant solutions for Azure, Office 365 and remote desktop environments, and Yubikeys can play a role.

October 21, 2022 Zachary Comeau Leave a Comment

Microsoft has announced new phishing-resistant solutions designed to help organizations protect against credential-based attacks in Azure, Office 365 and remote desktop environments, and hardware security key maker Yubico says the measures make it easier to secure accounts and assets using the YubiKey. Microsoft announced authentication strength, a new Conditional Access control that allows admins to […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: Google Innovations, Dell Edge Platform, Surface Devices, Security Spending

Google and Microsoft product announcements, a new Dell edge platform and data on security spending highlight this week's IT news.

October 13, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. Google Cloud Next ’22 announcements Google announced […]

Read More

MIcrosoft Entra External ID

Microsoft Releases Linux Desktop Management in Intune

Linux desktop management in Microsoft Intune, part of Endpoint Manager, brings support for registration, management and secure web access to Microsoft 365 and Azure resources for Linux Ubuntu LTS.

October 5, 2022 Zachary Comeau Leave a Comment

Microsoft is introducing the general availability of Linux desktop management in Microsoft Intune, as part of Microsoft Endpoint Manager, to bring support for device registration, endpoint management and secure web access to Microsoft 365 and Azure resources for Linux Ubuntu LTS. The new capabilities come with the October release of Intune, which will allow organizations […]

Read More

Spectrum Enterprise, Cisco

CompTIA: Organizations Need New Approaches to Cybersecurity

As IT operations and strategy have grown more complex, so has the management of cybersecurity, says CompTIA.

September 28, 2022 TD Staff Leave a Comment

Fortifying cybersecurity defenses remains a work in progress for many organizations, but many have yet to commit to the necessary resources to the effort, reveals research from CompTIA, the Downers Grove, Ill.-based nonprofit association for the information technology (IT) industry and workforce. A Q3 2022 study of technology and business professionals involved in cybersecurity feel […]

Read More

SideChannel Enclave Dashboard screen on laptop

SideChannel Launches Enclave Microsegmentation Platform for SMBs

SideChannel's Enclave microsegmentation platform offers SMBs a solution to simplify and maintain a segmented network with minimal IT administration and maintenance.

September 23, 2022 TD Staff Leave a Comment

SideChannel, the Worcester, Mass.-based provider of cybersecurity services and technology for emerging and middle market companies, announced the launch of Enclave, a microsegmentation software platform. The new platform is designed to offer small and midsize businesses (SMBs) a solution to simplify and maintain a segmented network with minimal IT administration and maintenance. According to SideChannel, […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Interim pages omitted …
  • Page 32
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.