• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

U.S. Cybersecurity Strategy

The Five Pillars of the New U.S. Cybersecurity Strategy

March 6, 2023 Zachary Comeau Leave a Comment

The Biden-Harris Administration has released its five-pronged National Cybersecurity Strategy designed to secure the digital ecosystem by putting more of the burden for cybersecurity on tech organizations and encouraging long-term investments in security. The Administration’s vision is meant to make the country’s digital ecosystem defensible, resilient and values aligned. The new strategy comes in the […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches New AI-Driven Identity Threat Detection and Response Model for SOC Solution

March 6, 2023 Zachary Comeau Leave a Comment

Cybersecurity giant Palo Alto Networks is launching its new Identity Threat Detection and Response module for its autonomous security operations center (SOC) solution Cortex XSIAM.   The Santa Clara, Calif.-based firm says the new solution enables customers to ingest user identity and behavior data and deploy AI technology to help detect identity-driven attacks within seconds, […]

Read More

Royal Ransomware

FBI, CISA Warn of Royal Ransomware Targeting Critical Infrastructure

March 3, 2023 Zachary Comeau Leave a Comment

U.S. agencies are warning critical infrastructure organizations to be on the lookout for Royal ransomware, a financially motivated threat actor that has been targeted manufacturing, communications, healthcare and education entities since September 2022. In a joint advisory, the FBI and U.S. Cybersecurity and Infrastructure Security Agency say the Royal ransomware actors have compromised U.S. and […]

Read More

Phishing, Email security

Phishing Remains a Favorite Hacking Tool as New Methods Emerge

March 3, 2023 Zachary Comeau Leave a Comment

Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]

Read More

Cybersecurity testing, penetration testing, cyber threats

No Organization Is an Island: How to Protect Against Supply Chain Attacks

March 2, 2023 Dirk Schrader Leave a Comment

Every organization interacts with other organizations: suppliers, partners, customers, government agencies and more. As a result, you can suffer a breach even though your organization was not directly targeted. For example, adversaries were able to release the infamous NotPetya malware to thousands of companies worldwide by compromising the supplier of a popular accounting software solution. […]

Read More

CISA Software Security

What CISA Learned After Conducting a Red Team Assessment of a Large Critical Infrastructure Organization

March 1, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory that describes a CISA red team assessment of a large critical infrastructure organization with a mature cyber posture, with the goal of sharing its key findings to help IT and security professionals improve monitoring and hardening of networks. According to the advisory, […]

Read More

MIcrosoft Entra External ID

Microsoft Launches Intune Suite for Unified Endpoint Management, Security

March 1, 2023 Zachary Comeau Leave a Comment

Microsoft is launching the Microsoft Intune Suite, a new unified endpoint management and security bundle designed to simplify endpoint management experiences, improve an organization’s security posture and improve the user experience. According to a Microsoft blog written by Michael Wallent, corporate vice president, of the company’s enterprise mobility management products, the new Intune Suite is deeply […]

Read More

Google, Passkeys

Google Rolls Out Client-Side Encryption to Gmail, Calendar

March 1, 2023 Zachary Comeau Leave a Comment

Google is expanding client-side encryption capabilities across Google Workspace, making the enhanced encryption generally available for three advanced Workspace plan types in Gmail and Calendar after enabling the security control for Drive, Docs, Slides, Sheets and Meet last year. Client-side encryption (CSE) is now generally available for Google Workspace Enterprise Plus, Education Plus and Education […]

Read More

LastPass Breach, Hack

LastPass Hack: Attacker Accessed DevOps Engineer’s Home Computer to Steal Decrpytion Keys

February 28, 2023 Zachary Comeau Leave a Comment

[Editor’s note: This article has been updated to reflect the company’s official statement on the new updates.] The same threat actor that accessed portions of the LastPass development environment and source code that has forced the company since August 2022 to provide updates as new information is revealed, apparently accessed a shared cloud-storage environment obtained […]

Read More

Palo Alto Networks Prisma SASE Accenture

Palo Alto Networks Launches Zero Trust OT Security Solution

February 27, 2023 Zachary Comeau Leave a Comment

Cybersecurity firm Palo Alto Networks is launching a new Zero Trust security solution for operational technology designed to help industrial organizations easily secure systems without having to deploy additional sensors. The Santa Clara, Calif.-based company’s Zero Trust OT Security solution is highlighted by the new cloud-delivered Industrial OT Security service that can be enabled — without […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.