
Articles byAbsolute Editorial Team
This is some text inside of a div block.

Expert Insights
AI Moves Faster than Security, CISOs Say Resilience is Way Forward
With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
This is some text inside of a div block.

Expert Insights
Microsoft Patch Tuesday April 2025
Microsoft’s April Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.
This is some text inside of a div block.

Expert Insights
Microsoft Patch Tuesday March 2025
Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
This is some text inside of a div block.

Expert Insights
K-12 Peer Forum Offers Distance Learning Insight
We recently sat down with Eric Ramos, CTO of Duarte Unified District in Duarte, California for a look back on lessons he and his team have learned throughout the pandemic.
This is some text inside of a div block.

Expert Insights
Microsoft Patch Tuesday February 2025: 53 Fixes, Including Weaponized Threats
This month’s fixes include two actively exploited vulnerabilities and two publicly disclosed ones.
This is some text inside of a div block.

Inside Absolute
Absolute Ceo Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019
We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.
This is some text inside of a div block.

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
This is some text inside of a div block.

Expert Insights
4 Recent Data Breaches That Originated On The Endpoint
As data breaches become more frequent, organizations must focus on securing endpoints to prevent vulnerabilities and mitigate the risks of costly breaches.
This is some text inside of a div block.

Products & Solutions
What Is Endpoint Management
Effective endpoint management is key to securing devices and sensitive data. Discover why managing endpoints is critical for staying ahead of evolving cyber threats.
This is some text inside of a div block.

Products & Solutions
How Experts Track Stolen Laptops
Learn how experts track and recover stolen laptops to protect sensitive data. Discover three crucial steps you can take to safeguard your organization.
This is some text inside of a div block.

Products & Solutions
How To Protect Your Data If A Laptop Is Lost Or Stolen
When a laptop goes missing, sensitive data is at risk. Follow these key steps to protect your information and reduce the impact of device theft or loss.
This is some text inside of a div block.

Expert Insights
Gdpr Keeping Theres Another Monster Hiding Bed
The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
No articles found for this author