• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

cybersecurity, vendor risk, third party vendor security risk

Syxsense Joins Microsoft Active Protections Program (MAPP)

May 17, 2022 TD Staff Leave a Comment

Aliso Viejo, Calif-based Syxsense, an IT and security management solutions provider, announced it has joined a group of cybersecurity software providers partnering with Microsoft to receive early vulnerability information through the Microsoft Active Protections Program (MAPP). The partnership further builds on Syxsense’s capabilities when helping customers scan, patch and secure endpoints. As a member of […]

Read More

Google, Bard

Google I/O: New Security Features in Workspace, Enrolling More Users In MFA

May 13, 2022 Zachary Comeau Leave a Comment

In addition to a range of new developer tools and new features in Workspace and Google Meet, Google announced during its I/O conference this week several new security features to help keep users and organizations secure. The new security capabilities include account safety for apps, new phishing protections, virtual cards and automatic enrollment in multi-factor […]

Read More

Microsoft Defender Vulnerability Management

Microsoft Releases New Defender Vulnerability Management Tool In Public Preview

May 13, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a public preview of Microsoft Defender Vulnerability Management, a new single solution that includes Microsoft’s full set of vulnerability management capabilities to help companies mitigate software bugs more easily. According to Microsoft, the new Defender feature builds on core threat and vulnerability management tools launched in 2019, including threat and vulnerability management […]

Read More

OT Cybersecurity, network security

8 Easy Ways to Fortify Operations from Cyber Threats with Technology You Already Have

May 13, 2022 Matt Powers Leave a Comment

If you thought cybersecurity couldn’t become more of a priority, think again. Belligerent nation-states and other bad actors are expected to launch a concerted effort to steal trade secrets, disrupt services, and execute malicious programs intended to cause infrastructure outages, damages, and worse. One study found a 100% increase in nation-state incidents from 2017 to […]

Read More

IoT Security

This Hacking Group Uses Unsecure IP Camera Systems to Hide From IT

May 3, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Mandiant has published a detailed analysis of a new threat actor that has been observed remaining undetected in victim environments for at 18 months by installing backdoors on IP cameras appliances that do not support security tools and leveraging a large IoT botnet to spy on organizations involved in large corporate transactions. According […]

Read More

Microsoft Security RSA Conference

Microsoft Defender For Business Is Now Generally Available

May 2, 2022 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of the stand-alone version of Microsoft Defender for Business, a new offering designed for small-to-mid-sized businesses that brings enterprise-grade endpoint security, detection and response to smaller organizations. According to Microsoft, this is designed to provide protection against ransomware and other sophisticated cyberattacks for SMBs, who say cyberthreats are becoming […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

Shadow IT Remote Work

Is a Reliance on Cloud, SaaS Apps Leading to Shadow IT?

April 29, 2022 Zachary Comeau Leave a Comment

A new report finds that the ongoing distributed work experiment and expanding use of enterprise technology is leading to IT management blind spots and shadow IT at more than 70% of organizations. According to enterprise technology management solutions provider Oomnitza, which surveyed IT leaders from 100 enterprises of more than 5,000 employees across the U.S., […]

Read More

Google Cybersecurity Certificate

Red Canary Announces Linux-First EDR, MDR Solution

April 29, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Red Canary is launching a new endpoint detection and response solution for Linux, designed to focus on the constraints that DevOps, engineering and security teams demand. According to the company, the Linux EDR and MDR solution will help organizations better protect their Linux environments, which can be difficult to secure. The solution leverages […]

Read More

Progress MOVEit vulnerability

Sophos: Average 2021 Ransomware Payment Skyrockets to More Than $800,000

April 27, 2022 Zachary Comeau Leave a Comment

An alarming new report from U.K.-based cybersecurity company Sophos finds that both the amount of organizations hit with ransomware and the ransom paid are drastically increasing, with the average ransomware payment now not far off from reaching seven figures. The company’s State of Ransomware 2022 report, the results of a survey of 5,600 IT professionals […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.