![Intel](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21133009/intel-1500-400x200.webp)
Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)
A vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI, which runs on various Intel processors, could be exploited locally to escalate privileges and run arbitrary …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Lenovo launches AI-based Cyber Resiliency as a Service
Lenovo has launched its new AI-based Cyber Resiliency as a Service (CRaaS) leveraging Lenovo device telemetry and the Microsoft security software portfolio including Microsoft …
![cybersecurity budget](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/27163444/cybersecurity_budget-1400-400x200.jpg)
Facts and misconceptions about cybersecurity budgets
Managing and allocating budgets for cybersecurity and IT has become an increasingly critical aspect of organizational strategy. Organizations recognize the need to invest …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Lenovo and Microsoft join forces to simplify security deployments
Lenovo and Microsoft are working together to help organizations operate more securely across their devices, users, apps, data, networks, and cloud services through a …
![Nima Baiati](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/21112757/nima_baiati-2-lenovo-400x200.jpg)
The pitfalls of neglecting security ownership at the design stage
For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Lenovo introduces new data management solutions to deploy AI workloads
Lenovo announced its next wave of data management innovation with new ThinkSystem DG Enterprise Storage Arrays and ThinkSystem DM3010H Enterprise Storage Arrays, designed to …
![Arthur Hu](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/17110906/arthur_hu-2-lenovo-400x200.jpg)
Using AI/ML to optimize your tech stack and enhance business efficiency
In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses how AI/ML is optimizing tech stacks, the hurdles …
![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
CIOs prioritize innovation over tech stack optimization
Despite economic obstacles and constraints on IT budgets, global CIOs maintain a positive outlook on the potential of technology to provide significant benefits for their …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103112/businessman-400x200.jpeg)
CIOs prioritize new technologies over tech stack optimization
Despite economic headwinds and IT budget challenges, the world’s CIOs are bullish about the power of technology to deliver value for their organizations, according to Lenovo. …
![innovation](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093753/innovation-400x200.jpg)
CIOs find it most difficult to solve cybersecurity challenges
A global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as well as …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Nebulon enables 4-minute ransomware recovery on Lenovo ThinkSystem rack server edge deployments
Nebulon announced 4-minute ransomware recovery on Lenovo ThinkSystem rack server edge deployments. With this announcement, Nebulon provides enterprises with a Lenovo-based …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
Sequitur Labs and Lenovo join forces to secure AI models at the edge
Sequitur Labs announced that it has been selected by Lenovo as the technology vendor of choice for protecting edge AI computing applications utilized as part of the Lenovo …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders