• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

Microsoft Authenticator FIPS iOS

Microsoft Brings FIPS 140 Compliance to Authenticator on iOS

December 14, 2022 Zachary Comeau Leave a Comment

Microsoft says it is bringing FIPS 140 compliance for Microsoft Authenticator on iOS devices for organizations with security and compliance concerns. In a Tech Community blog, the Redmond, Wash.-based IT giant says many of its customers that work in environments with security and compliance requirements need authenticators to use cryptography validated by the Federal Information […]

Read More

Cybersecurity testing, penetration testing, cyber threats

This is How Executives and IT Leaders View Cybersecurity Going into 2023

December 14, 2022 Zachary Comeau Leave a Comment

In addition to an expanded partnership with Google and new attack surface management tools, new innovations to Prisma Cloud and more, Palo Alto Networks this week during its Ignite conference released new research that found that nearly all of 1,300 IT leaders surveyed experienced at least one cyber incident or breach over the last year. […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New Tool To Help Automate Vulnerability Remediation

December 12, 2022 Zachary Comeau Leave a Comment

Palo Alto Networks is releasing Xpanse Active Attack Surface Management, a new tool built into the cybersecurity solution provider’s Cortex platform designed to help security teams actively find and fix known and unknown internet-connected risks. According to the Santa Clara, Calif.-based company, Xpanse Active Attack Surface management (Xpanse Active ASM) is designed with automation to […]

Read More

Microsoft Apple macOS bug

Apple Introduces Wider Data Protections, Encryption, Security Keys

December 7, 2022 Zachary Comeau Leave a Comment

Apple has announced three new security features designed to protect user data and protect against threats in the cloud, including wider data protections, the ability to verify the identity of contacts and support for third-party security keys. According to the company, the three new features join a suite of other security tools to make Apple […]

Read More

Malware file types, HP Wolf security

HP: Archive File Format Use Among Hackers on the Rise

December 5, 2022 Zachary Comeau Leave a Comment

Office files are no longer the most common file type for delivering malware, as archive file formats such as ZIP and RAR files are the file type of choice for threat actors to deliver malware, according to a new report from HP Wolf Security. The findings come from a quarterly report from HP’s endpoint security […]

Read More

AWS Amazon Security Lake

AWS Launches Verified Access for VPN-less Secure Remote Access

December 1, 2022 Zachary Comeau Leave a Comment

Amazon Web Services (AWS) is launching the preview of AWS Verified Access, a new secure connectivity service designed to allow employees to enable local or remote secure access for corporate applications without a VPN. The company says Verified Access is built using the AWS Zero Trust Security principles and leverages multiple security inputs to grant […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

SMBs Are Struggling With Cloud Security

November 29, 2022 Zachary Comeau Leave a Comment

While cloud computing is helping organizations modernize their operations and be more agile, cloud technology is also introducing new threats, according to cybersecurity firm Sophos. The U.K.-based cybersecurity service company published results of a recent survey of IT professionals at small and mid-size organizations, finding that 56% of infrastructure-as-a-service (IaaS) users saw an increase in […]

Read More

Zero Trust, Leostream, AWS

Department of Defense Outlines Zero Trust Strategy, Roadmap

November 23, 2022 Zachary Comeau Leave a Comment

The U.S. Department of Defense (DoD) has released its Zero Trust Strategy and Roadmap, a guiding document designed to aid the department’s implementation of a Zero Trust security architecture by 2027. According to the department, the strategy “envisions a DoD Information Enterprise secured by a fully implemented, Department-wide Zero Trust cybersecurity framework that will reduce […]

Read More

Microsoft Windows 11 Copilot

New Microsoft Service in Preview Will Augment IT Security Teams

November 22, 2022 Zachary Comeau Leave a Comment

Microsoft is launching in preview its Defender Experts for XDR offering a managed extended detection and response (MXDR) service that goes beyond endpoint protection across Microsoft 365 using both automation and security experts to respond to incidents. This comes as many organizations are enlisting the help of managed services to augment their security operations, and […]

Read More

Tanium converged cybersecurity endpoint management platform

State of Arizona Selects Tanium Converged Endpoint Management for Statewide Cyber Readiness Program

November 21, 2022 TD Staff Leave a Comment

The state of Arizona has chosen Tanium, the Kirkland, Wash.-based converged endpoint management (XEM) platform to protect citizens’ sensitive and confidential data across its 100+ agencies, 15 counties, 91 cities, 230 K12 districts and 22 tribal nations. The Arizona Department of Homeland Security provides strategic direction and access to federal homeland security resources. It also […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.