Addigy exposes RSR update gap in 25% of managed macOS devices

Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed environments. Learn more. The post Addigy exposes RSR update... Read more »

Spearphishing report: 50% of companies were impacted in 2022

Barracuda Networks found that spearphishing exploits last year worked to great effect and took days to detect. The post Spearphishing report: 50% of companies were impacted in 2022 appeared... Read more »

EY survey: Tech leaders to invest in AI, 5G, cybersecurity, big data, metaverse

Generative AI is of particular interest to leaders for the benefits of cost savings, efficiency and effectiveness. The post EY survey: Tech leaders to invest in AI, 5G, cybersecurity,... Read more »

Dell’s Project Helix heralds a move toward specifically trained generative AI

On-premises artificial intelligence and specifically trained generative AI are now enterprise trends. Leaders from Dell and NVIDIA and analysts from Forrester Research weigh in. The post Dell’s Project Helix... Read more »

Microsoft Dataverse: Going from Excel to new AI-powered tools

Improvements in the data store for Microsoft’s low-code platform aim to help businesses build on their data. Learn more about Microsoft Dataverse. The post Microsoft Dataverse: Going from Excel... Read more »

Chinese state-sponsored attack uses custom router implant to target European governments

Learn technical details about this cyberattack, as well as Check Point Research’s tips on how to detect and protect against this security threat. The post Chinese state-sponsored attack uses... Read more »

How to manage and share files online using NordLocker

With NordLocker, you can store, manage and share individual files. Learn how with this step-by-step guide. The post How to manage and share files online using NordLocker appeared first... Read more »

How and why to use multiple Apple IDs on the same Mac

There are a few reasons Apple users should sometimes employ a pair of Apple IDs on the same Mac. Here’s how to make it work. The post How and... Read more »

Report: More organizations still plan to increase their tech staff

A new Linux Foundation report finds that the global focus is on cloud/containers, cybersecurity and AI/ML skills, and that upskilling is key. The post Report: More organizations still plan... Read more »

How business email compromise attacks emulate legitimate web services to lure clicks

New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. The post How business email compromise attacks emulate legitimate web services... Read more »
Subscribe to our Newsletter