• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cyber Security

government cyberattacks Google Microsoft

Who Got Hacked This Week? June 24 Edition

June 24, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, June 24, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Defendify cybersecurity platform

Why Investors Put Over a Million into the Defendify Cybersecurity Platform

June 20, 2019 Adam Forziati Leave a Comment

Over half of small businesses in the U.S. said they’ve experienced some kind of cyberattack within the past 12 months, says a Hiscox Cyber Readiness Report. Yet many lack a way to alert, diagnose, and solve these security concerns in a holistic way — and for a reasonable price. Recent funding gained by Defendify, a SaaS-delivered […]

Read More

biggest data breaches, data breaches list, data breaches and hacks

The 5 Biggest Data Breaches in 2019 So Far (And How They Could Have Been Prevented)

June 20, 2019 Adam Forziati Leave a Comment

IBM says in a study that the cost of lost business after a breach for US organizations is $4.2 million. It is evident, then, that the organizations involved in the 5 biggest data breaches in 2019 thus far will likely suffer a considerable economic blow.   But if you read this data breaches list thinking, “these are mega-companies; the risk of a data […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

Proofpoint CISO, CISOs cyberattack

Cybersecurity Remains Inadequate Following 2016 Election

June 18, 2019 Sam Harton Leave a Comment

Despite the fact that scandals relating to cybersecurity and privacy policy riddled headlines following the presidential election, there has been little federal reform in those realms.

Read More

software

SIG Platform Blends Software Analysis with Expertise of Consultants

June 10, 2019 Lisa Montgomery Leave a Comment

A new concept implemented by Software Improvement Group aims to improve software security and health.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? June 3 Edition

June 3, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, June 3, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

cybercrime

DomainTools Integrates with Anomali for Advanced Protection Against Cybercrime.

May 30, 2019 Lisa Montgomery Leave a Comment

Threat detection, investigation and incident response provide companies with greater detail about potential cybercrime.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? May 23 Edition

May 23, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, May 23, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Intel’s chip-making deal

University of Michigan’s MORPHEUS Chip Encrypts 20 Times Per Second

May 23, 2019 Jessica Messier Leave a Comment

The university’s hacker-resistant development changes code and seals off network vulnerabilities faster than ever.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Interim pages omitted …
  • Page 45
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.