Expert Insights
Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.
Explore our Blog Library
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Embrace The Shadow IT Mindset Not The Shadow

Expert Insights
Embrace The Shadow IT Mindset Not The Shadow
It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
Threat Protection
Shadow IT
Application Resilience
Resilience
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

Expert Insights
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
Compliance
Data Protection
Threat Protection
Why Data Sanitization Across Remote Endpoints Matters

Expert Insights
Why Data Sanitization Across Remote Endpoints Matters
As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Data Protection
Endpoint Resilience
Remote Work
When Data Insights Matter

Expert Insights
When Data Insights Matter
As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience
What Is Cyber Resilience And How Can You Achieve It

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
Compliance
Endpoint Resilience
Resilience
What's in Store for Cybersecurity in 2023

Expert Insights
What's in Store for Cybersecurity in 2023
As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.
Endpoint Resilience
Remote Work
Ransomware
What’s Your Strategy for Collecting Student Devices?

Expert Insights
What’s Your Strategy for Collecting Student Devices?
K-12 student device collection was already a complex process before the rapid shift to distance learning. Thankfully, there are a few approaches you can take to ease the collection process.
IT Asset Management
Endpoint Resilience
Vulnerability and Patch Management
What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

Expert Insights
What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021 which includes closely managing every stage of the device lifecycle.
Data Protection
Endpoint Resilience
Remote Work
The Parents’ Perspective: Insights into Distance Learning and Security

Expert Insights
The Parents’ Perspective: Insights into Distance Learning and Security
As we approach the mid-way mark of the 2020-2021 school year, distance learning remains an instructional delivery cornerstone for most schools in one way or another. How are we actually doing?
Data Protection
Endpoint Resilience
IT Asset Management
The True Challenge of School Inventory Audits

Expert Insights
The True Challenge of School Inventory Audits
Simplify your K-12 school’s end-of-year inventory audits with Absolute’s streamlined device tracking. Maximize accuracy, reduce risk, and save time with powerful tools.
Endpoint Resilience
IT Asset Management
Compliance
The Growing Dangers of Unencrypted Devices

Expert Insights
The Growing Dangers of Unencrypted Devices
Zero Trust is essential for securing hybrid work. Discover how it strengthens endpoint security and minimizes risk in remote environments.
Endpoint Resilience
Remote Work
Zero Trust
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches

Expert Insights
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
There has been plenty of conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.
Data Protection
Resilience
Endpoint Resilience
Sorry, no items found...