COVID-19 Update

Cybersecurity

Smart buildings will be a big part of our collective future.

Building-Technology Trends for Safer, More Sustainable Environments

As people continue to occupy buildings in this new environment, we will likely see five important building-technology trends this year.

lessons from Kaseya Attack

Secure Collaboration in the Hybrid Workplace

Hybrid work environments require a 24/7/365 cybersecurity blanket around all company data, devices and assets.

lessons from Kaseya Attack

3 Reasons AV Integrators Should Prioritize Cybersecurity

It’s essential for the commercial AV integration channel to focus on cybersecurity. We share some key reasons why.

Cybersecurity Holidays, tech dealer

Tech Dealer Caught in Sophisticated Cybersecurity Scam

Integrator’s hacked email results in client making wire transfer of $62,000 to fraudulent account in sophisticated cybersecurity scam.

BenQ Instashow WDC30

BenQ Releases InstaShow WDC30 Most Secure Wireless Presentation System to Date

The Instashow WDC30 features three layers of wireless protection to meet security requirements of government, healthcare and financial institutions.

cybersecurity money

Follow the Cybersecurity Money!

How you can build a cybersecurity as-a-service business model and the earnings potential for your company on May 25 at 2pm ET.

What You Need to Know About IP KVM Security

Securing critical environments and distributed workforces is becoming more critical due the rise of cyber-attacks and threats. This guide looks at the essential security elements needed when deploying an IP KVM solution.

Metaverse Cybersecurity

Interested in the Metaverse? Think Security First, Microsoft Says.

Microsoft’s EVP of security, compliance, identity and management urges organizations to prioritize the cybersecurity of the metaverse.

Crestron DM NVX enhancement logo

Crestron’s DM NVX AV-over-IP Line Receives IT Security Certifications

Crestron’s DM NVX solutions are now certified by the NIAP, certifying that the products meet cybersecurity standards.

Hacker with computer symbolizing cyberattacks against Tech Service Providers, Microsoft Okta Lapsus$

What We Know So Far About Okta, Microsoft and Lapsus$

Microsoft and Okta are investigating after Lapsus$ hacking group posts screenshots of purported security incidents.