Absolute Editorial Team

Blog Author:
Absolute Editorial Team

Absolute Editorial Team

Absolute Security's editorial team brings you in-depth analysis on cybersecurity trends, challenges, and solutions.

Read more

Articles by
Absolute Editorial Team

This is some text inside of a div block.
Expert Insights

AI Moves Faster than Security, CISOs Say Resilience is Way Forward

With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
This is some text inside of a div block.
Microsoft Patch Tuesday April 2025
Expert Insights

Microsoft Patch Tuesday April 2025

Microsoft’s April Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.
This is some text inside of a div block.
March Patch Tuesday roll-up—visualizing ongoing cybersecurity hygiene.
Expert Insights

Microsoft Patch Tuesday March 2025

Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
This is some text inside of a div block.
Student with laptop at desk—portraying secure online learning practices.
Expert Insights

K-12 Peer Forum Offers Distance Learning Insight

We recently sat down with Eric Ramos, CTO of Duarte Unified District in Duarte, California for a look back on lessons he and his team have learned throughout the pandemic.
This is some text inside of a div block.
February Patch Tuesday summary—highlighting critical security updates.
Expert Insights

Microsoft Patch Tuesday February 2025: 53 Fixes, Including Weaponized Threats

This month’s fixes include two actively exploited vulnerabilities and two publicly disclosed ones.
This is some text inside of a div block.
Hands on keyboard—highlighting secure access and real-time device usage.
Inside Absolute

Absolute Ceo Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019

We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.
This is some text inside of a div block.
Executive boardroom—illustrating governance and cyber decision-making.
Expert Insights

What Is Cyber Resilience And How Can You Achieve It

A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
This is some text inside of a div block.
Woman working on laptop—enabling mobile productivity with strong security.
Expert Insights

4 Recent Data Breaches That Originated On The Endpoint

As data breaches become more frequent, organizations must focus on securing endpoints to prevent vulnerabilities and mitigate the risks of costly breaches.
This is some text inside of a div block.
Digital interface concept—representing transformation and cyber innovation.
Products & Solutions

What Is Endpoint Management

Effective endpoint management is key to securing devices and sensitive data. Discover why managing endpoints is critical for staying ahead of evolving cyber threats.
This is some text inside of a div block.
Hacked system alert—illustrating consequences of compromised security.
Products & Solutions

How Experts Track Stolen Laptops

Learn how experts track and recover stolen laptops to protect sensitive data. Discover three crucial steps you can take to safeguard your organization.
This is some text inside of a div block.
Close-up of modern laptop—representing endpoint protection in business.
Products & Solutions

How To Protect Your Data If A Laptop Is Lost Or Stolen

When a laptop goes missing, sensitive data is at risk. Follow these key steps to protect your information and reduce the impact of device theft or loss.
This is some text inside of a div block.
Businessman using laptop—portraying corporate cybersecurity awareness.
Expert Insights

Gdpr Keeping Theres Another Monster Hiding Bed

The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
No articles found for this author