• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

Zero Trust, Leostream, AWS

Zscaler Introduces Advanced Zero Trust Solutions to Minimize Attack Surface, Prevent Lateral Movement

March 23, 2022 Zachary Comeau Leave a Comment

Cloud security provider Zscaler is launching what it says are three industry-first zero trust network access innovations designed to replace legacy firewalls and VPNs delivered as part of the company’s Zero Trust Exchange. According to the company, the offerings — private app protection, integrated deception and privileged remote access for industrial IoT and OT systems […]

Read More

Lapsus$ Microsoft Okta

Lapsus$ Attacks: Microsoft Says Group Pays Employees For Initial Access; Okta Provides Attack Timeline

March 23, 2022 Zachary Comeau Leave a Comment

Microsoft acknowledges Lapsus$ accessed source code, downplays risk to customers and risk of elevation Lapsus$ uses extensive social engineering, including paying victims’ employees for initial access and convincing help desks to reset credentials Group uses VPNs, RDP, VDI and identity providers such as Azure AD, Okta in attacks Okta says 2.5% of customers potentially impacted […]

Read More

MIcrosoft Okta Lapsus$

What We Know So Far About Okta, Microsoft and Lapsus$

March 22, 2022 Zachary Comeau Leave a Comment

This article has been amended to reflect an updated statement on the incident from Okta.  After screenshots claiming to stem from security breaches at IT giant Microsoft and identity and authentication provider Okta, both companies are investigating possible attacks from the Lapsus$ hacking group. In statements to various media outlets, the companies say they are […]

Read More

Russia Cyberattack

Russian Cyberattack Threat Evolves, Spurs New White House Warning To Harden IT Environments

March 21, 2022 Zachary Comeau Leave a Comment

The White House is urging organizations to take immediate action to harden cyber defenses as credible intelligence of a Russian cyberattack in response to U.S. involvement in the Ukraine crisis continues to evolve. In a statement by President Joe Biden and a related fact sheet, the administration says there is “evolving intelligence that the Russian […]

Read More

Proofpoint CISO, CISOs cyberattack

CISA: Russian Hackers Leveraged Default MFA, PrintNightmare To Gain Network Access

March 16, 2022 Zachary Comeau Leave a Comment

According to U.S. authorities, Russian state-sponsored hackers are leveraging default multi-factor authentication (MFA) protocols and the PrintNightmare vulnerabilities to gain network access. In a joint advisory, the FBI and Cybersecurity and Infrastructure Security Agency say cyber actors backed by the Russian government began pairing those attack vectors as early as May 2021 to target a […]

Read More

SBOMs

What Needs To Be In An SBOM?

March 15, 2022 Zachary Comeau Leave a Comment

When alleged Russian hackers compromised the SolarWinds Orion platform to spy on U.S. agencies and other high-profile entities, the tech industry renewed its call for the adoption of software bills of materials (SBOM) — an inventory of components that make up the final product. Advocates say that will help give IT and cybersecurity professionals the […]

Read More

Cybersecurity Workforce

Why Women Are Needed To Fill The Cybersecurity Workforce

March 14, 2022 Alyssa Borelli Leave a Comment

In 2021, women represented about 25% of the global cybersecurity workforce, according to Cybersecurity Ventures. With over 2.5 million-plus cybersecurity job openings, women can help fill them, writes Vasu Jakkal, vice president of security, compliance, identity, and management at Microsoft in a blog post. With millions of job openings for cybersecurity, it’s putting a strain […]

Read More

Atera ESET Integration

The Qakbot Malware Now Interjects Itself Into The Middle of Email Conversations

March 11, 2022 Zachary Comeau Leave a Comment

The notorious and heavily distributed email-borne malware Qakbot is now being spread via a new technique: inserting malicious replies into the middle of existing email conversations. According to cybersecurity firm Sophos, Qakbot uses the compromised accounts of other infected victims to interject itself in the form of a reply-all message that includes a short sentence […]

Read More

Mobile Malware

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

March 10, 2022 Zachary Comeau Leave a Comment

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report. This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Study: It Takes Over Three Months For Cybersecurity Teams to Adopt New Skills

March 10, 2022 Zachary Comeau Leave a Comment

With today’s cybersecurity attacks rapidly escalating to never-before-seen proportions and new threats constantly emerging, IT and cybersecurity professionals should be able to quickly pivot and develop the knowledge and skills to defend against these threats. However, a new study suggests that it takes more than three months for that to happen. According to cybersecurity firm […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Page 29
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.