RDM: End of Online Drive and Online Backup
Devolutions Online Drive will be removed on September 1st. Migrate your data to Devolutions Hub Personal or use the File Backup tool to avoid data loss.
View ArticleNew report reveals major shift in cybersecurity talent crisis
The cybersecurity talent gap isn’t about interest—it’s about skills. Hiring managers now prioritize technical capabilities over resumes, and seek talent from outside traditional pools.
View ArticleDecoding passkeys: The key to a passwordless world
Explore the concept of passkeys and their potential to redefine digital authentication by eliminating the need for passwords.
View ArticleWebinar: Operationalizing NIS2: Implementing key security controls with...
Learn how to operationalize NIS2 with Devolutions in our interactive webinar, featuring live demos and a live Q&A session.
View ArticleApril poll results: What’s your BEST April Fools’ Day prank?
Discover the best April Fools’ Day IT pranks from our community—from desktop chaos to keyboard hacks. Hilarious, harmless, and a little genius. See who pulled off the ultimate tricks!
View ArticleSpotlight on: Devolutions' passkey support
Discover how Devolutions makes passwordless authentication effortless with passkey support across our products.
View ArticleMay poll question: Does your company use passkeys for authentication?
It's World Passkey Day! Join the movement toward passwordless logins—faster, safer, and phishing-proof. Vote in our poll & you could win a $25 Amazon gift card!
View Article6 cybersecurity lessons we can learn from Star Wars
This blog explores six essential cybersecurity lessons inspired by Star Wars, blending IT best practices with memorable scenes from the saga to highlight the importance of vigilance and teamwork.
View ArticleRevenge of the 5th: 5 big cybersecurity mistakes SMBs make
Discover 5 key cybersecurity mistakes SMBs make—revealed through the lens of Revenge of the Sith—and learn how to avoid them with help from Obi-Wan, Anakin, and the Devolutions team.
View ArticleSpotlight on: Lansweeper synchronizer in Remote Desktop Manager
Centralize IT asset management with RDM’s Lansweeper sync. Automate syncing for secure, simplified control—boosting productivity and efficiency with ease.
View ArticleSpotlight on: Supremo, a new Remote Desktop Manager-integrated remote access...
Discover Supremo: a secure, budget-friendly remote desktop solution for IT pros, teams, and MSPs — now integrated with Remote Desktop Manager.
View ArticleBoard Games at Devolutions: 2025 edition
From zoos to zero-gravity landings — here are 6 board games the Devolutions team is loving right now (plus some friendly competition and maybe a bit of sabotage).
View ArticleSpotlight on: RDM CyberArk PVWA credential entry for PSM connection
RDM now supports CyberArk PSM connections via PVWA credentials and a new resolving mode, enabling secure, streamlined session launches without direct password retrieval.
View ArticleDevolutions Renews SOC 2 Type II Report for Hub Business and Hub Personal
Devolutions has renewed its SOC 2 Type II report for the period of January 1 to December 31, 2024, reaffirming the strength and effectiveness of its security controls for Hub Business and Hub Personal.
View ArticleSpotlight on: Streamlined SSH key management with Devolutions PAM
Streamline SSH key management with Devolutions PAM’s new built-in key rotation, offering centralized control, automated updates, and improved visibility for better security and compliance.
View ArticleStrengthening cybersecurity with Devolutions — Essential 8 compliance
Learn how Devolutions aligns with the Essential 8 to enhance cybersecurity. Download our free white paper—no sign-up required!
View ArticleSpotlight on: RDM CyberArk Secure Infrastructure Access (SIA) for RDP and SSH
Enhance privileged access management in RDM with CyberArk SIA: secure endpoint connections, minimal friction, and fewer authentication steps.
View ArticleMay poll results: Does your company use passkeys for authentication?
Over 40% of our community uses passkeys, and nearly all others are exploring them — a positive sign in the fight against phishing.
View Article