• All
  • Articles
microsoft intune april 2025 update: what’s new & why it matters

Microsoft Intune April 2025 Update: What’s New & Why It Matters

What’s New in Intune – April 2025 | Service Release (2504) Welcome to the April 2025 edition of our monthly Intune update series. This month’s Service Release introduces several enhancements across app prot...
the future of security: two shifts you can’t ignore

The Future of Security: Two Shifts You Can’t Ignore

The security industry is on the cusp of its next major transformation — and it’s not happening where most people expect.In a recent conversation with Risky Business News, Devicie CEO Shane Harding outlined two ...
microsoft intune march 2025 update: what’s new & why it matters

Microsoft Intune March 2025 Update: What’s New & Why It Matters

What’s New in Intune – March 2025 | Service Release (2503) Welcome to the March edition of our "What’s New in Intune" series, where we break down the latest updates in Microsoft’s Intune service rel...
authenticity vs. automation: leading in the age of ai

Authenticity vs. Automation: Leading in the Age of AI

At Devicie, we don’t just use AI—we live it. It’s not a feature bolted on for show. It’s built into how we operate, think, and scale. From marketing to operations, AI is our digital co-pilot. But here’s the q...
making cybersecurity boring again: why simplicity and consistency are key to effective defense

Making Cybersecurity Boring Again: Why Simplicity and Consistency Are Key to Effective Defense

I’ve dedicated my career to a single mission: building the world’s best cyber defense solutions for organizations. And it’s been a lot of fun. Starting back in the late nineties, I’ve been in the trenches of cy...
building successful partnerships with technology vendors: insights from experience

Building Successful Partnerships with Technology Vendors: Insights from Experience

25 Years of Insights: Keys to Successful Tech Partnerships Over the past 25 years, as a second-generation IT professional, I have had the privilege of consulting for and delivering technology solutions to m...
streamlining nist csf v2.0 compliance with devicie and microsoft intune

Streamlining NIST CSF v2.0 Compliance with Devicie and Microsoft Intune

By leveraging Microsoft Intune, Devicie helps accelerate your organization's National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) program. Devicie’s advanced platform simplifie...
devicie: streamlining your essential eight compliance

Devicie: Streamlining Your Essential Eight Compliance

By leveraging Microsoft Intune, Devicie can accelerate and simplify your Essential Eight program. Our advanced platform streamlines delivery and ongoing management of endpoint devices, ensuring seamless comp...
tom plant discusses preparing for windows 10 end of support on risky.biz

Tom Plant discusses preparing for Windows 10 end of support on Risky.Biz

With the end of support deadline for Windows 10 looming, Tom Plant discussed with Risky Business’ Catalin Cimpanu how partners can help their customers ensure they’re ready. Some customers will require hardware...
how windows 10 end of support is accelerating modern device management transformation

How Windows 10 end of support is accelerating modern device management transformation

IT innovation is exploding. Mainstream AI products are becoming more prevalent, and with them come more complex productivity, security and compliance requirements, especially for endpoints. Whilst some organiza...
entering a new era of efficiency with zero touch provisioning

Entering a new era of efficiency with zero touch provisioning  

Using traditional device provisioning methods ties up IT resources for days or weeks, pulling them away from more business-critical tasks and negatively impacting the bottom line.
tom plant discusses windows security policy on risky.biz

Tom Plant discusses Windows security policy on Risky.Biz

Our Technical Product Manager, Tom Plant, caught up with Risky.Biz founder Patrick Gray on the Risky.Biz podcast.   They discussed Microsoft Windows Policy Management an...
devicie co-founder and cto awarded microsoft mvp

Devicie Co-founder and CTO awarded Microsoft MVP

We are delighted to reveal that our co-founder and CTO, Jose Schenardie, has been awarded the title of Microsoft Most Valuable Professional (MVP), recognising his contributions to the tech com...
devicie doubling down on growth by appointing colin britton as chief operating officer

Devicie doubling down on growth by appointing Colin Britton as Chief Operating Officer

TAMPA BAY, Feb. 29, 2024 – Devicie, a leader in hyperautomation and orchestration for Microsoft 365 environments, is excited to announce the appointment of Colin Britton as Chief Operating Officer. In th...
asd cyber threat report key findings

ASD Cyber Threat Report key findings

ASD Cyber Threat Report key findings Developed by the Australian Signals Directorate (ASD), the ASD Cyber Threat Report 2...
predictions on trends and emerging technologies in cyber security

Predictions on trends and emerging technologies in cyber security

Introduction What does the future hold for cybersecurity and cyberspace?  In the past few years, cyber attacks have surged in both volume and attention, with constant phishing and ransomware cam...
expert tips for implementing intune

Expert tips for implementing Intune

Implementing Intune   i mplementing Intune is a significant project. Historically many Intune migrations have come unstuck due to complexity, leaving organisations in a hybrid state, or no better ...
implementing essential eight controls with devicie

Implementing Essential Eight controls with Devicie

With most enterprises now adopting some form of remote work arrangements, the need and demand for robust security to protect employee devices has never been greater.   In the face of rising cyber...
why a breaker became a maker

Why a breaker became a maker

Introduction Cutting to the chase: The breaker   Why does my opinion matter?  Well, to many people it might not.  But, I’ve been hacking stuff for quite a while.  In fact, I...
the role of ux in cyber security

The role of UX in cyber security

Ensuring the security of digital infrastructure and data is a basic responsibility of IT.  But, what about enabling a good end user experience (UX)?  There's a misconception that robust device ...
fostering a culture of empathy and pragmatism for effective patch management

Fostering a culture of empathy and pragmatism for effective patch management

Introduction Patch management is a tough nut to crack.  Even with all the information available out there, patching remains a notoriously challenging IT task that companies of all sizes struggle with.&nb...
challenging mindsets on admin privileges

Challenging mindsets on admin privileges

Introduction According to the International Data Corporation (IDC), 70 per cent of security threats originate from user endpoints. And, according to industry reports 82 per cent of data breaches in 2021 involv...
removing admin privileges without compromising productivity

Removing admin privileges without compromising productivity

How to remove local admin privileges without compromising productivity or employee satisfaction  ...
don't start your intune project without considering these factors

Don't start your Intune project without considering these factors

Introduction When it comes to designing an Intune project, there are things to do and there are things to avoid.   There is what good looks like and then there is every...
drawbacks of managing your own soe

Drawbacks of managing your own SOE

Introduction Infrastructure-as-a-service is now a smarter, safer and cheaper way for many organisations to manage their SOE.  Years ago, when I worked in an IT helpdesk role, the boss pointed out ...
a zero trust security model for the modern workplace

A Zero Trust security model for the modern workplace

The pandemic changed the modern workplace with innumerable businesses moving off-premises and adopting a hybrid work culture almost overnight.   And, since the world changed at the end...
security versus productivity: the dilemma

Security versus productivity: The dilemma

It’s time to redefine best-practice security in terms of greater productivity and a better user experience.  Keeping businesses secure is a top priority for CISOs, but best-practice security ...
pros and cons of virtual desktop infrastructure

Pros and Cons of Virtual Desktop Infrastructure

Introduction Improved security, long-term savings and centralised management are all pitched as some of the top reasons to invest in virtual desktop infrastructure (V...
No result Found!