• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

3CX Supply Chain Attack

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

April 27, 2022 Zachary Comeau Leave a Comment

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell. The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting […]

Read More

insider threats, military document leak, Jack Teixeira, insider risk

Insiders Pose Cybersecurity Threat to Healthcare

April 26, 2022 TD Staff Leave a Comment

The U.S. Department of Health and Human Services (HHS) Cybersecurity Program Office of Information Security warned healthcare facilities on Thursday about vulnerabilities to insider threats. HHS cited a 2020 study from Ponomon, which found that 61% of data breaches involving an insider are primarily unintentional, caused by negligent insiders. Nearly 14% of breaches, however, are […]

Read More

MIcrosoft Entra External ID

Microsoft to Completely End SMB1 Protocol in Windows

April 20, 2022 Zachary Comeau Leave a Comment

Microsoft is beginning the final phase of disabling SMB1 in Windows, announcing that SMB1 is now disabled by default for Windows 11 Home Insiders, and the company will remove the SMB1 binaries and the drivers and DLLs of SMB1 in future releases. In a Tech Community blog, Ned Pyle, a principal program manager in the […]

Read More

Proofpoint CISO, CISOs cyberattack

Hackers Adapting Despite Improved Detection, Mandiant Says

April 19, 2022 Zachary Comeau Leave a Comment

Although the IT software supply chain and the technologists tasked with using those tools to keep organizations safe from cyberattacks continue to innovate, hackers are also adapting their techniques to target and infiltrate organizations’ IT environments, according to cybersecurity firm Mandiant’s M-Trends report. The company’s M-Trends 2022 report, based on investigational metrics between Oct. 1 […]

Read More

Why Healthcare Needs Better Data Security

April 12, 2022 Brian Foy Leave a Comment

As the healthcare industry accelerates into an increasingly digitized world, cyber breaches exposing confidential patient data are becoming more commonplace. In fact, according to the Department of Health and Human Services’ Office for Civil Rights’ breach portal, a staggering 44,993,618 healthcare records were exposed or stolen in 2021. The implications of these security breaches are […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Supply Chain Attacks Jump 51% In Second Half of 2021

April 12, 2022 Zachary Comeau Leave a Comment

Recent IT supply chain attacks such as the SolarWinds compromise, ransomware campaign that leveraged the Kaseya VSA platform or mass exploitation of the Log4j vulnerabilities have renewed focus on such attacks, which NCC Group says increased by 51% in the last half of 2021. The consulting and managed services firm’s global survey of 1,400 cybersecurity […]

Read More

Microsoft Security RSA Conference

Microsoft’s New Defender for Endpoint for Windows Sever 2012 R2, 2016 Now Available

April 12, 2022 Zachary Comeau Leave a Comment

Microsoft’s new unified Defender for Endpoint solution for Windows Server 2012 R2 and Windows Server 2016 is now generally available. According to Microsoft, this adds new prevention, detection and response capabilities to Defender for Endpoint on those versions that were previously only available on Windows Server 2019 and later. The new unified Defender reduces complexity […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Two Cybersecurity Leaders Partner To Help You Investigate Sophisticated Hacks

April 8, 2022 Zachary Comeau Leave a Comment

Mandiant and CrowdStrike, two of the largest cybersecurity providers, are teaming up to help joint customers investigate, remediate and defend against advanced cybersecurity threats, with Mandiant using the CrowdStrike Falcon platform and subscription offerings for its incident response services. The partnership between the two cybersecurity giants will enable organizations of all sizes to leverage both […]

Read More

China, Hacking, Microsoft, Routers, Volt Typhoon

Report: Advanced Threats Detected Rise 33% in Q4

April 7, 2022 Zachary Comeau Leave a Comment

If the fourth quarter for 2021 is any indication, 2022 will be another year that cybersecurity and IT professionals would want to forget, as advanced network attacks increase by 33% in the fourth quarter, indicating a higher level of zero day threats than ever before, reports WatchGuard Technologies. In a new analysis of the fourth […]

Read More

MIcrosoft Entra External ID

Microsoft Releases New Defender for Identity Response Capabilities

April 1, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the general availability of new response actions in Microsoft Defender for Identity for on-premises Active Directory accounts when an identity is compromised and simultaneously protect identities across cloud and on-premise environments. According to Microsoft, the core components of an identity security product should work to prevent malicious actions, detect them, investigate and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.