• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

Microsoft 365 domain, cloud.microsoft

Microsoft Office 365 Government Secret Cloud Coming Soon

April 1, 2022 Alyssa Borelli Leave a Comment

Microsoft announced a new U.S. government cloud environment: Office 365 Government Secret Cloud which is currently under review, pending accreditation with targeted availability starting mid-2022. The new Azure environment is built to support the U.S. Federal Civilian, Department of Defense, intelligence community and U.S. government partners working within the secret enclave. As workloads have shifted […]

Read More

metaverse digital cyber world technology jobs

Metaverse and Crypto Jobs Are on the Rise

March 31, 2022 TD Staff Leave a Comment

In the new world of work, job ads are increasingly featuring some of tech’s new favorite buzzwords – the ‘metaverse’, ‘crypto’, ‘cybersecurity’ – and are seeking experts in the field. The number of ‘metaverse’ vacancies has more than quadrupled in four months, increasing +379% from October, according to research from the Indianapolis-based job search engine […]

Read More

Vulnerability Scanning

The Key Components of a Vulnerability Scanning & Management Program

March 31, 2022 Zachary Comeau Leave a Comment

With thousands of new software vulnerabilities to protect against each year, it is critical that organizations develop a robust vulnerability management program that can quickly identify and remediate vulnerabilities in IT environments. Issues like Log4Shell, PrintNightmare, ProxyLogon and dozens of other critical vulnerabilities in widely used systems have kept IT departments up at night as […]

Read More

zoom chat leader, Enterprise Sound Bar Collaboration Kit, videoconferencing, cybersecurity

Must-Have Cybersecurity Features for Videoconferencing

March 30, 2022 TD Staff Leave a Comment

George Waller, EVP and co-founder of StrikeForce Technologies, an entrepreneur and technologist with over two decades in the cybersecurity and computer industries offers insights into must have cybersecurity features for videoconferencing and how we should be thinking about meetings in the future. Q: What are the top cybersecurity and data privacy concerns with general purpose […]

Read More

Metaverse Cybersecurity

Interested in the Metaverse? Prioritize Cybersecurity, Microsoft Says.

March 30, 2022 Zachary Comeau Leave a Comment

As Big Tech firms begin to dive head first into the metaverse, Microsoft is urging the industry to make cybersecurity a priority and establish core security principles before the emerging technology becomes too advanced and vulnerable to exploitation. In a blog post, Charlie Bell, the company’s executive vice president of security, compliance, identity and management, […]

Read More

Crestron DM NVX

Crestron’s DM NVX AV-over-IP Line Receives IT Security Certifications

March 29, 2022 Zachary Comeau Leave a Comment

Workplace technology maker Crestron says its line of DM NVX AV-over-IP solutions are now certified by the National Information Assurance Partnership (NIAP) and the U.S. government’s Common Criteria, certifying that the products meet cybersecurity standards. The designations open up new avenues for the DM NVX products in U.S. government agencies, including federal civilian agencies and […]

Read More

How Fast Does Ransomware Encrypt Files?

March 25, 2022 Zachary Comeau Leave a Comment

For IT and cybersecurity professionals, ransomware has been the scourge of the earth over the last two years, as the cybercrime economy continues to grow and beat system administrators and network defense pros to the point of attack. One reason for the difficulty in preventing and responding to ransomware attacks is the speed with which […]

Read More

McAfee ransomware attack

51% of Small Businesses Don’t Have Cybersecurity Measures in Place

March 25, 2022 TD Staff Leave a Comment

According to a new study, a majority of small businesses have no protection against cyberattacks, suggesting that businesses and their consumers are vulnerable to hacking and identity theft. A study from Digital.com, an independent website for small business online tools, products and services, revealed that 51% of small businesses do not have protection against cyberattacks. […]

Read More

Phishing Success rates

Watch Out For This Chameleon Phishing Scheme

March 25, 2022 TD Staff Leave a Comment

Security researchers at TrustWave SpiderLabs encountered a phishing scheme that acts like a chameleon by changing and blending its color based on its environment. The site adapts its background page and logo depending on the user input to trick victims into giving away their email credentials. The phishing scheme starts with an email asking the […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

30% Of Log4j Instances Remain Vulnerable To Exploitation

March 24, 2022 Zachary Comeau Leave a Comment

More than two months after the Log4j vulnerabilities known as Log4Shell were discovered, 30% of Log4j instances remain vulnerable for hackers to exploit and take control of affected systems, according to cybersecurity firm Qualys. The company indexed more than 10 trillion data points across its installed enterprise customer base and completed six billion IP scans […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.