Skip to content
Building a Smarter OS Update Strategy with Declarative Device Management
Weldon Dodd

5 min read

Building a Smarter OS Update Strategy with Declarative Device Management

Managing operating system updates across an Apple device fleet has always been a balancing act. Push updates too aggressively, and you risk disrupting critical workflows. Move too cautiously, and you expose your organization to security vulnerabilities. The solution? A well-designed N-1 OS update strategy powered by declarative device management (DDM).

Thought Leadership
The New Face of IT: More Ops, Less Headcount
Weldon Dodd

6 min read

The New Face of IT: More Ops, Less Headcount

Thought Leadership
Unlocking Apple’s New Device Management API
Arek Dreyer

4 min read

Unlocking Apple’s New Device Management API

Thought Leadership

Ransomware Readiness: Tips from Beyond the Playbook
Arek Dreyer

4 min read

Ransomware Readiness: Tips from Beyond the Playbook

The call came at 2 AM. A major U.S. telecom provider, critical infrastructure supporting millions of cell phone users, was under active ransomware attack. Systems were encrypting rapidly across their network. Within hours, the FBI was coordinating response efforts, executives were in crisis mode, and a specialized team was rebuilding Active Directory from scratch while the clock ticked. For Eric Pittman, VP of Cybersecurity at Teradata, this wasn't a tabletop exercise or theoretical scenario. It was a real-world crisis that revealed critical gaps in how organizations prepare for and respond to ransomware attacks.

Thought Leadership
Apple’s Recent Updates to Platform SSO: What Problems Will It Solve?
Arek Dreyer

6 min read

Apple’s Recent Updates to Platform SSO: What Problems Will It Solve?

A frank look at where Platform SSO stands today, what's coming with macOS Tahoe 26, and the hard choices Mac administrators need to make

Thought Leadership
5 Lessons from One Company’s ISO 42001 Certification Journey
Satyam Patel

4 min read

5 Lessons from One Company’s ISO 42001 Certification Journey

The rapid development and adoption of AI is creating new opportunities for businesses across industries. From predictive analytics and natural language processing to automated decision-making, AI is transforming business operations and the customer experience. However, with this vast potential comes significant risk – especially for compliance leaders who must navigate an everchanging and complex landscape of emerging regulations, ethical considerations, and governance challenges.

Thought Leadership
Arek Dreyer

7 min read

"Keep Learning, Keep Leading": Advice for Apple Admins

Your iPhone has more computing power than entire university systems had 50 years ago. In another 50 years, the information processing capabilities available to us will be exponentially greater still. Yet our brains remain fundamentally unchanged, evolved to track seasonal patterns and remember a few dozen faces, not to process the constant stream of security bulletins, product announcements, API changes, and community discussions that define modern Apple administration.

Thought Leadership
How to Fix The Patching Problem Every IT Team Knows Too Well
Weldon Dodd

7 min read

How to Fix The Patching Problem Every IT Team Knows Too Well

Let's be honest: patch management in 2025 feels like trying to drink from a fire hose while juggling flaming torches. You're managing thousands of devices, dealing with constant vulnerability announcements, and somehow expected to keep everything secure without driving your users (or yourself) completely insane.

Thought Leadership
User-Based vs. Device-Based Security Exclusions: Finding the Right Balance
Iru Team

7 min read

User-Based vs. Device-Based Security Exclusions: Finding the Right Balance

Security exclusions represent one of the most nuanced decisions admins face when designing effective security policies. These exceptions to your standard security rules require careful consideration - apply them too liberally, and you risk creating security gaps; too restrictively, and you might impede legitimate work. But before you can determine how many exclusions to implement, you need to decide what type of exclusions make the most sense for your environment.

Thought Leadership
No More Pitchforks: How to Build User Trust During Security Rollouts
Iru Team

6 min read

No More Pitchforks: How to Build User Trust During Security Rollouts

The scene is familiar to anyone who's worked in IT or security: an urgent vulnerability needs patching, a new control must be deployed immediately, or a policy change can't wait. You execute the technical implementation flawlessly. Then come the Slack messages and emails.

Thought Leadership
Apple Intelligence in the Enterprise: an Admin’s Perspective
Iru Team

4 min read

Apple Intelligence in the Enterprise: an Admin’s Perspective

The Six Colors 2025 Apple in the Enterprise Report Card has sparked plenty of conversation about Apple’s direction, areas of growth, and continued challenges with enterprise products. Jason Snell, founding editor of Six Colors, and Weldon Dodd, Iru Distinguished Solutions Engineer unpacked the report’s findings and what they mean for Apple device administrators on a recent MacAdmins Podcast episode.

Thought Leadership
Choosing the Best Mac Login Experience: Comparing Kerberos SSO, Platform SSO, and Kandji Passport
Iru Team

11 min read

Choosing the Best Mac Login Experience: Comparing Kerberos SSO, Platform SSO, and Kandji Passport

The login screen, also known as the login window, is the start of every user’s Mac experience. But the average user doesn't give it much thought - they just enter a password and move on. Yet behind that moment is a critical security checkpoint and a key part of the user experience.

Thought Leadership
When Great Engineers Quit: Why Tools Make or Break Job Satisfaction
Iru Team

7 min read

When Great Engineers Quit: Why Tools Make or Break Job Satisfaction

The tech industry has a retention problem, but not for the reasons most people expect. Rather than quitting because work is too complex or challenging, talented IT and security engineers tend to leave because their tools prevent them from doing meaningful work.

Thought Leadership
What WWDC 2025 and the Next macOS Release Could Mean for Apple Admins
Iru Team

6 min read

What WWDC 2025 and the Next macOS Release Could Mean for Apple Admins

Every year, Apple’s new macOS release offers an opportunity to innovate. It also brings uncertainty for IT teams trying to keep pace with constant change. With the next major release set to preview at WWDC 2025 (June 9 to 13), admins are preparing for a high-stakes upgrade cycle. Early previews hint at broad updates spanning the Apple product suite, from design changes that unify UX across devices to much-anticipated Apple Intelligence features.

Thought Leadership
How to Manage Activation Lock: A Guide for Apple Admins
Mike Boylan

10 min read

How to Manage Activation Lock: A Guide for Apple Admins

Activation Lock is a theft-deterrent feature found in iOS and iPadOS devices and modern Mac computers (with the Apple T2 Security chip and Apple silicon). When such a device is attempted to be set up after having been erased, it checks with Apple servers to see if Activation Lock is on. If it is, the device requires the user’s Apple Account password before it can be used again (reactivated). This effectively removes the device’s resale value, making it less attractive to thieves.

Thought Leadership

Stay up to date

Iru's weekly collection of articles, videos, and research to keep IT & Security teams ahead of the curve.