• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: zero trust

Progress MOVEit vulnerability

Progress Software Urges Further Action to Prevent MOVEit Exploitation

Defending against exploitation of MOVEit vulnerabilities gets more complicated as Progress Software issues another patch.

June 16, 2023 Zachary Comeau Leave a Comment

The MOVEit Transfer story continues to plague IT departments and security professionals as Progress Software has issued another advisory, urging organizations to apply yet another patch to address a privilege escalation flaw in its Transfer product. The company’s update comes amid reports of widespread exploitation, including several at several U.S. agencies that were breached as […]

Read More

June 2023 Patch Tuesday. Patch Tuesday,

June 2023 Patch Tuesday: Exchange Server, SharePoint, PGM

The June 2023 Patch Tuesday release includes no active threats, but critical vulnerabilities still need to be patched, experts say.

June 13, 2023 Zachary Comeau Leave a Comment

Microsoft has released fixes for about 70 vulnerabilities for its June 2023 Patch Tuesday release, and while none are listed as being actively exploited of publicly known, there are still a handful of critical-rated vulnerabilities that IT admins should prioritize this month. That list of bugs that should be prioritized includes two remote code execution […]

Read More

Phishing, Email security

Email Attacks are Evading Security Protections. Here’s How Security Teams Should Respond.

IT, security teams and end users should take these actions to combat increasingly sophisticated email threats.

June 6, 2023 Trevor Collins Leave a Comment

Instances of business email compromise (BEC) – a targeted form of phishing in which attackers try to scam companies out of money or goods or trick employees into giving up sensitive info – have continued to increase, causing devastating impacts. Last year, the FBI’s Internet Crime Complaint Center (IC3) reported $43 billion of global exposed […]

Read More

Digital transformation technology strategy, digitization and digitalization of business processes and data

Five Key Topics for Digital Transformation in Manufacturing Companies

Improve manufacturing efficiency, productivity and CX by integrating digital tech. Learn five key considerations for a successful digital transformation strategy.

May 30, 2023 Alexander Paulus Leave a Comment

Digital transformation is the key to unlocking the full potential of manufacturing companies in the 21st century. By integrating digital technology into all aspects of manufacturing, companies can fundamentally change how they operate and deliver value to their customers. This shift has become especially essential in manufacturing, where customer experience and flexibility are taking center […]

Read More

Engineer manager shows intelligent industrial system with software and digital manufacturing, artificial intelligence technology of modern innovation.

MCi Protects Its Customers Worldwide With Quorum Cyber’s Enterprise-Grade Cybersecurity

The SaaS provider selected managed service provider, Quorum Cyber, for its expertise in Microsoft Sentinel, Azure and cloud computing.

May 30, 2023 TD Staff Leave a Comment

Serving state, local governments, and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls, Inc. (MCi) needed to transform its cybersecurity to the world-class level expected by its long list of prestigious customers. As a software technology and services provider, MCi provides critical Software-as-a-Service (SaaS) solutions and its TRACK platform […]

Read More

June 2023 Patch Tuesday. Patch Tuesday,

April 2023 Patch Tuesday: CLFS Under Active Attack Again; 10-Year-Old Bug Reissued

IT administrators have a busy month with Microsoft alone releasing patches for 100 vulnerabilities, including one under active attack.

April 11, 2023 Zachary Comeau Leave a Comment

IT administrators in Microsoft environments have about 100 patches to apply for the April 2023 Patch Tuesday release, including one in Windows Common Log File System Driver that is being actively exploited and another one from 2013 that is being reissued. The company released patches to fix 97 vulnerabilities in its products, which was in […]

Read More

ransomware emsisoft, organization impacted by ransomware

Businesses Beware: April is the Most Dangerous Month for Ransomware Attacks

The month of April is expected to be a high-risk month when it comes to ransomware attacks, according to NordLocker research.

April 6, 2023 TD Staff Leave a Comment

The month of April has been identified as the most dangerous period in terms of ransomware attacks, according to research by end-to-end file encryption provider NordLocker. Last year, the month of April saw 294 ransomware incidents, the most attacks per month in all of 2022. Most of these attacks were carried out against U.S. and […]

Read More

June 2023 Patch Tuesday. Patch Tuesday,

March 2023 Patch Tuesday: Two Actively Exploited Bugs in Outlook, SmartScreen

Microsoft's March 2023 Patch Tuesday includes fixes for 76 vulnerabilities, two of which are being exploited in the wild.

March 14, 2023 Zachary Comeau Leave a Comment

Microsoft’s March 2023 Patch Tuesday release includes fixes for 76 vulnerabilities in the company’s products, with two listed as being actively exploited, one of which also being listed as publicly known. The amount of bugs fixed by Microsoft this month is on par with the tech giant’s February security update when it patched 75 vulnerabilities, […]

Read More

Cybersecurity testing, penetration testing, cyber threats

No Organization Is an Island: How to Protect Against Supply Chain Attacks

To defend against supply chain attacks, organizations need to focus on all three layers of the attack surface: data, identities and infrastructure.

March 2, 2023 Dirk Schrader Leave a Comment

Every organization interacts with other organizations: suppliers, partners, customers, government agencies and more. As a result, you can suffer a breach even though your organization was not directly targeted. For example, adversaries were able to release the infamous NotPetya malware to thousands of companies worldwide by compromising the supplier of a popular accounting software solution. […]

Read More

These 3 Departments Pose the Highest Risk of Being Hacked

Experts from NordLocker reveal which departments are most at risk of being hacked and why and provide tips on safeguarding your business from a cyberattack.

February 18, 2023 TD Staff Leave a Comment

Cybersecurity experts from NordLocker, part of Nord Security, reveal that employees from certain departments are much more lucrative targets for cybercriminals than others. With human error being the reason behind a whopping 82% of data breaches, employees are the weakest link when it comes to organizational cybersecurity. “From receptionists to the C-Suite, every employee should […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 32
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.