Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Absolute’s Third Annual K-12 Endpoint Risk Report Examines IT and Security Outcomes of the Scramble to Digital Learning
Student using laptop—portraying secure digital learning platforms.
Expert Insights

Absolute’s Third Annual K-12 Endpoint Risk Report

Leveraging anonymized data from over 10,000 schools and districts, the Absolute Endpoint Risk Report: Education Edition illustrates how distance learning has been fully embraced – but that critical efficiency and security gaps remain.
IT Asset Management
Threat Protection
Data Protection
Enforcing Location Policies in Work- and Learn-from-Anywhere Environments
Laptop during travel—emphasizing mobile device security on the go.
Expert Insights

Cybersecurity in 2025: Location Policies for Remote Workers

Discover effective strategies for enforcing location policies to protect remote devices and ensure cybersecurity compliance.
Remote Work
Endpoint Resilience
Data Protection
AI Moves Faster than Security, CISOs Say Resilience is Way Forward
Expert Insights

AI Moves Faster than Security, CISOs Say Resilience is Way Forward

With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
Resilience
Generative AI
Threat Protection
4 Ways to Keep Your School Resilient During Distance Learning 2.0
Student studying with laptop—supporting safe, connected learning experiences.
Expert Insights

Keep Your School Resilient During Distance Learning

Whether schools operate with full distance learning or by implementing a hybrid approach, we all have to ensure our devices are fully operational, secure and up to date for the duration of the school year.
Data Protection
Endpoint Resilience
Threat Protection
4 Recent Data Breaches That Originated On The Endpoint
Woman working on laptop—enabling mobile productivity with strong security.
Expert Insights

4 Recent Data Breaches that Originated on the Endpoint

Let’s look at four recent breaches that originated on the endpoint to examine what you could do now to avoid a similar fate.
IT Asset Management
Endpoint Resilience
Threat Protection
Absolute’s CEO Christy Wyatt On The Future Of Endpoint Security
Focused user on laptop—symbolizing secure remote productivity.
Expert Insights

Absolute CEO Christy Wyatt on the Future of Endpoint Security

Resilient, self-healing, secure endpoints are what matters today and CIOs are recognizing complexity is a vulnerability. Absolute offers a permanent digital tether to every endpoint and CISOs are noticing.
Endpoint Resilience
Resilience
Remote Work
Minimizing Business Disruption A Discussion About Cyber Resilience on Nasdaq TradeTalks
Nasdaq cybersecurity blog header—representing market security insights.
Expert Insights

Minimizing Disruption: Cyber Resilience on Nasdaq TradeTalks

Cyberattacks, the lasting impact they can have, and ways to achieve cyber resilience as we head into 2024 was the topic of a panel discussion featuring Absolute CEO Christy Wyatt on an episode of Nasdaq TradeTalks.
Data Protection
Resilience
Endpoint Resilience
Generative AI
5 Things to Look Out for to Avoid Buying a Stolen Laptop
Damaged laptop—representing risks of device loss and data exposure.
Expert Insights

How to Avoid Buying a Stolen Laptop: 5 Things to Know

Learn how to spot a stolen laptop and protect yourself from buying one. Ensure your devices are safe with these essential tips for secure purchases.
Endpoint Resilience
Data Protection
Threat Protection
Cybersecurity Awareness Series: Enterprise Security Controls
Cybersecurity concept with a digital lock icon
Expert Insights

Cybersecurity Awareness Series: Enterprise Security Controls

While enterprise security controls are many, and well-meaning, if they go unmonitored on endpoints, they can easily degrade and become compromised. Here's what can be done about it.
Data Protection
Endpoint Resilience
Threat Protection
Microsoft Patch Tuesday February 2025: 53 Fixes, Including Weaponized Threats
February Patch Tuesday summary—highlighting critical security updates.
Expert Insights

Microsoft Patch Tuesday February 2025

However, size doesn’t always equate to impact as this month’s fixes include two actively exploited vulnerabilities and two publicly disclosed ones.
Compliance
Resilience
Application Resilience
Microsoft Patch Tuesday April 2025
Expert Insights

Microsoft Patch Tuesday April 2025 | Absolute Security

Microsoft’s April 2025 Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.
Compliance
Resilience
Application Resilience
How to Achieve Cyber Resilience
Cybersecurity blog header—emphasizing digital defense and risk awareness.
Expert Insights

How to Achieve Cyber Resilience

How to build a resilient infrastructure that defends against attacks, zero day threats, and ensures fast recovery.
Resilience
Endpoint Resilience
Compliance
Ransomware
Sorry, no items found...