This policy will help your organization safeguard its hardware, software and data from exposure to persons (internal or external) who...more
Hardware
Equipment reassignment checklist
The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and...more

New zero-click threat targets iPhones and iPads
Image: Marcos Silva/Adobe Stock The Moscow-based cybersecurity company Kaspersky says iOS devices are being targeted by a previously unknown malware....more
Enterprise IoT calculator: TCO and ROI
Internet of Things devices serve a number of useful applications, such as environmental, asset or inventory monitoring/control, security functions, fitness...more

WWDC 2023: Apple launches Vision Pro and raft of products powered by new chipsets
Apple’s Vision Pro AR headset. Image: Apple Apple announced on Monday at WWDC 2023 its much anticipated Vision Pro augmented...more

Support for these Microsoft enterprise products ends in 2023
Image: Pixabay Microsoft has a policy that limits application support to ten years for most products without a defined lifecycle....more

Dell’s sustainable data center management strategy: Interview with expert Alyson Freeman
Image: peach_adobe/Adobe Stock At Dell Technologies World in Las Vegas, sustainability and an increasing need for processing power were both...more

Dell’s Project Helix heralds a move toward specifically trained generative AI
Image: Supatman/Adobe Stock Generative artificial intelligence is at a pivotal moment. Enterprises want to know how to take advantage of...more

Chinese state-sponsored attack uses custom router implant to target European governments
Image: ArtemisDiana/Adobe Stock Check Point Research released a new report that exposes the activities of a Chinese state-sponsored APT threat...more

Juggling critical infrastructure for data centers, hospitals and more, with an eye on resilience
Image: Gorodenkoff/Adobe Stock Data is as viable as the physical systems supporting and powering the servers that store it. Threats...more