• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

SBOMs

Report: Older Vulnerabilities Plaguing Legacy Systems

March 8, 2022 Zachary Comeau Leave a Comment

New critical software vulnerabilities are discovered every month, but its older vulnerabilities in legacy systems that continue to plague IT departments and cybersecurity professionals, according to new research from cybersecurity firm F-Secure. The report, Attack Landscape Update, dishes on trending cybersecurity threats, including ransomware, malware, phishing and more, but the most alarming information in the […]

Read More

Google, Bard

Google To Acquire Cybersecurity Leader Mandiant For $5.4 Billion

March 8, 2022 Zachary Comeau Leave a Comment

Google is acquiring Mandiant and is adding the cybersecurity defense and response firm’s services to its Google Cloud portfolio in a $5.4 billion deal. Mandiant, formerly part of cybersecurity firm FireEye and a reported target of Microsoft, will complement Google Cloud’s existing security offerings, including BeyondCorp Enterprise for Zero Trust and VirusTotal for malicious content […]

Read More

Google, AI, Google Security AI Workbench

Reports: Google, Not Microsoft, Probing Mandiant Acquisition

March 7, 2022 Zachary Comeau Leave a Comment

The fate of Mandiant, formerly part of cybersecurity firm FireEye and a reported target of Microsoft, could just as well end up as part of Google, according to new reports. According to The Information, citing sources familiar with the talks, Google is eyeing Mandiant in a bid to boost its cloud security offerings. The Information’s […]

Read More

Progress MOVEit vulnerability

The Conti Ransomware Leaks: Six Takeaways

March 7, 2022 Zachary Comeau Leave a Comment

Information security, nation-state hacking, ransomware and malware have been front and center of the Russia-Ukraine conflict, with hackers on each side allegedly launching large-scale attacks against the infrastructure of their opponent. Although Russia is infamous for its hacking activities and ransomware groups long believed to be protected by the country’s government, threat actors in other […]

Read More

NSA Network Security

NSA: This Is How Admins Should Do Network Security

March 7, 2022 Zachary Comeau Leave a Comment

With cybersecurity now the top concern for IT leaders and their team, dozens of organizations, including private companies, nonprofits, IT providers and cybersecurity vendors have released cyber-hardening guides over the last few years to help organizations secure their infrastructure. The U.S. Cybersecurity and Infrastructure Agency, in particular, has been a leading voice when it comes […]

Read More

CISA Software Security

CISA Adds 95 New Bugs To Database Of Known Exploited Vulnerabilities

March 4, 2022 Zachary Comeau Leave a Comment

There are 95 new known exploited vulnerabilities that IT and security professionals should immediately investigate and mitigate, including several that date back at least a decade, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The agency added the vulnerabilities to its catalog of known exploited vulnerabilities based on evidence of exploitation in the […]

Read More

1Password Browser Extension

We Aren’t Getting Much Better At Password Security

March 4, 2022 Zachary Comeau Leave a Comment

Users are not getting much better at password security, as 1.7 billion credential were exposed online in 2021, and 64% of users with multiple compromised passwords reuse similar passwords for multiple accounts, according to a new report from account security firm SpyCloud. The company, in its Identity Exposure Report, says the number of exposed credentials […]

Read More

Google Cybersecurity Certificate

Senate-Passed Cybersecurity Bill Requires Incident Reporting Within 72 Hours

March 2, 2022 Zachary Comeau Leave a Comment

The Senate has passed a bipartisan bill designed to harden U.S. cybersecurity in both public and private sectors requiring organizations to report significant cyberattacks and ransomware payments to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The proposed bill, Strengthening American Cybersecurity Act, combines language from three bills that Sens. Rob Portman (R-OH), Gary Peters […]

Read More

3CX Hack Supply Chain attack compromise

These Destructive Malware Strains Have Targeted Organizations in Ukraine

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Hybrid Meeting; FBI warns of BEC scams

How to Use Virtual Meeting Platforms Securely

February 25, 2022 TD Staff Leave a Comment

Americans spend an average of two hours and five minutes a week making video calls via online meeting platforms like Zoom, Skype, and Microsoft Teams, according to research by NordVPN. With videoconferencing platforms gaining popularity, cybersecurity experts are warning users about the dangers of being scammed and potentially infected by malware through them. “Since the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 26
  • Page 27
  • Page 28
  • Page 29
  • Page 30
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.