• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

CISA Software Security

CISA Adds Single-Factor Authentication To List of Bad Practices

August 30, 2021 Alyssa Borelli Leave a Comment

CISA has added the use of single-factor authentication for remote or admin access to its list of “Bad Practices.”

Read More

government money huawei

An Update About Huawei: What Decision Makers Need to Know

March 19, 2020 Jessica Messier Leave a Comment

A recently passed bill bans government money from buying tech equipment from Huawei for American companies.

Read More

Firefox Update

Firefox is Making the Internet Safer for Users – Here’s How

March 17, 2020 Jessica Messier Leave a Comment

Firefox will start switching users to encrypted-DNS to keep ISPs out of their business.

Read More

The U.S. Accuses Huawei of Using Tech Backdoors to Help China Spy

March 4, 2020 Jessica Messier Leave a Comment

The U.S. claims that China is able to spy on it due to intentionally created vulnerabilities incorporated in equipment provided by Huawei.

Read More

ActiveEye 2.0

Delta Risk’s ActiveEye 2.0 Uses Automation to Keep Your Network Safe

October 24, 2019 Zachary Comeau Leave a Comment

Cybersecurity firm Delta Risk has released its next-generation cloud-based ActiveEye platform that the company says is more efficient and can eliminate more than 95% of false positives by leaning heavily on automation. The platform has an advanced focus on security automation that can sift through daily security alerts generated by next-generation endpoint detection and response […]

Read More

cloud maturity check

It’s Time to Assess Your Cloud Security & Maturity: Here’s How

August 13, 2019 Kurt Hagerman Leave a Comment

The path to the cloud is a twisting, hairpin-laden road for almost every enterprise. Many were dragged to the cloud by business units charging ahead. Some may have started out with a deliberate strategy, only to see it warp out of shape by new, quickly bolted-on cloud apps procured (officially or unofficially) to support new […]

Read More

most important cybersecurity training tips

Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees

August 6, 2019 David Share Leave a Comment

It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threat to a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This means you could probably stand to receive a […]

Read More

NetOps Teams, biophilic hospital design

Obstacles and Priorities for NetOps Teams (And How to Address Them)

July 30, 2019 Jay Botelho Leave a Comment

Network Operations (NetOps) teams today are operating in one of the most exciting and challenging times in IT history. As many organizations set their sights on adopting major technologies like SD-WAN, edge computing, and virtualization to tap into the tremendous business benefits they can bring to bear, most IT teams are dealing with countless other […]

Read More

analysis software, TraceFrame

CloudShark TraceFrame is a Devkit for Network Visibility

July 16, 2019 TechDecisions Staff Leave a Comment

QA Cafe, a provider of test and analysis software solutions for communication and IT teams, announces the launch of its CS TraceFrame development kit. Based on the company’s CloudShark analysis software, CS TraceFrame brings instant packet visibility to products offering network and cloud visibility, performance monitoring, diagnostics, or cybersecurity. “Packet data is a critical value-add […]

Read More

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.