• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

Google Cybersecurity Certificate

Cyber Risk Accountability Is Shifting Outside Of IT

February 24, 2022 Zachary Comeau Leave a Comment

Accountability for cybersecurity risk is shifting outside of IT, and the role of the cybersecurity leader needs to evolve, Gartner says in a new report. According to Gartner, security and risk managers are investing more effort into evaluating and influencing the cyberhealth of external parties, employees are making more decisions with cyber risk implications and […]

Read More

Microsoft Defender Google Cloud

Microsoft Defender for Cloud Can Now Protect Google Cloud Environments

February 23, 2022 Zachary Comeau Leave a Comment

Microsoft now offers multi-cloud protection for the cloud industry’s top three platforms by extending the native capabilities for Microsoft Defender for Cloud to the Google Cloud Platform. This follows cloud security support for AWS in Defender for Cloud, which Microsoft released last November during its Ignite conference. According to Microsoft, Defender for Cloud support for […]

Read More

CISA Software Security

Supplement Your Cybersecurity Staff With These Free CISA Resources

February 22, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released a litany of free security tools and resources designed to help organizations advance its security capabilities, including widely used open-source tools and services offered by private and public sector organizations. The catalog of free resources comes amid rising geopolitical tensions that both government agencies and software […]

Read More

MIcrosoft Entra External ID

Microsoft Pushes Zero Trust Capabilities In Azure

February 18, 2022 Zachary Comeau Leave a Comment

Microsoft is positioning itself as a partner in the U.S. government’s push toward a Zero Trust architecture, including the publication of resources designed to help organizations migrate to the cloud and adopt a Zero Trust framework and the release of Azure capabilities to help secure cloud environments. In a new blog, Microsoft outlined several resources, […]

Read More

Atera ESET Integration

Hackers Are Sending Malicious Files In Microsoft Teams

February 17, 2022 Zachary Comeau Leave a Comment

As Microsoft Teams boasts a growing user base that is now over 270 million monthly active users, hackers are targeting it as a launchpad for sending malicious files, according to a new report from cybersecurity firm Avanan. The company, a Check Point subsidiary, says it began last month observing hackers dropping malicious executable files in […]

Read More

Russia Ukraine Cyberattacks

Cybersecurity Experts: Ukraine, Russia Crisis Could Result in U.S. Cyberattacks

February 16, 2022 Zachary Comeau Leave a Comment

As the world waits to see what unfolds in Ukraine, cybersecurity professionals are urging western governments and organizations to be prepared for serious cyberattacks coming from Russia and its allies. These warnings come from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) as well as private sector cybersecurity software providers like Mandiant that have raised […]

Read More

VMware Vulnerabilities

VMware: Patch These Vulnerabilities Immediately

February 15, 2022 Zachary Comeau Leave a Comment

VMware is urging customers to immediately patch vulnerabilities in ESXi, Workstation, Fusion and Cloud Foundation running in on-premises or co-located settings. The patches fix a total of five CVEs in those products that were disclosed during the Tianfu Cup, a Chinese security event that VMware participates in. According to the company, the flaws were reported […]

Read More

Proofpoint CISO, CISOs cyberattack

Red Canary Adds 24/7 Remediation, Protection Features

February 15, 2022 Zachary Comeau Leave a Comment

Threat detection provider Red Canary has added new capabilities and active remediation features to its cybersecurity offerings, including protections for systems beyond the endpoint and a new active 24/7 threat response offering. According to the company, the new threat investigation and active remediation features are designed to help customers investigate, triage and respond to threats, […]

Read More

Microsoft Apple macOS bug

Apple: Apply These iPhone, iPad and Mac Patches Now

February 10, 2022 Zachary Comeau Leave a Comment

Organizations with iPhones, iPads in their IT environment should apply a new Apple security update that fixes a new zero day code execution vulnerability that has been exploited in the wild. In an advisory, Apple said the issue impacts a wide range of devices, including: iPhone 6s and later, iPad Pro (all models), iPad Air […]

Read More

NordVPN Threat Protection

NordVPN Steps Further Into Cybersecurity With Threat Protection Offering

February 9, 2022 Zachary Comeau Leave a Comment

NordVPN is stepping into the antivirus market with the release of Threat Protection, a new cybersecurity product integrated into the NordVPN app that offers protection against phishing attempts, malicious websites, infected files and other online threats. Specifically, the new offering mitigates three primary kinds of threats: web trackers and malicious ads, harmful websites and infected […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 27
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.