Expert Insights
Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.
Most recent
Why Data Sanitization Across Remote Endpoints Matters
As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Published
November 9, 2021
Updated

Explore our Blog Library
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Why Data Sanitization Across Remote Endpoints Matters

Expert Insights
Why Data Sanitization Across Remote Endpoints Matters
As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Data Protection
Endpoint Resilience
Remote Work
When Data Insights Matter

Expert Insights
When Data Insights Matter
As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience
What Is Cyber Resilience And How Can You Achieve It

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
Compliance
Endpoint Resilience
Resilience
What's in Store for Cybersecurity in 2023

Expert Insights
What's in Store for Cybersecurity in 2023
As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.
Endpoint Resilience
Remote Work
Ransomware
What’s Your Strategy for Collecting Student Devices?

Expert Insights
What’s Your Strategy for Collecting Student Devices?
K-12 student device collection was already a complex process before the rapid shift to distance learning. Thankfully, there are a few approaches you can take to ease the collection process.
IT Asset Management
Endpoint Resilience
Vulnerability and Patch Management
What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

Expert Insights
What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021 which includes closely managing every stage of the device lifecycle.
Data Protection
Endpoint Resilience
Remote Work
The Parents’ Perspective: Insights into Distance Learning and Security

Expert Insights
The Parents’ Perspective: Insights into Distance Learning and Security
As we approach the mid-way mark of the 2020-2021 school year, distance learning remains an instructional delivery cornerstone for most schools in one way or another. How are we actually doing?
Data Protection
Endpoint Resilience
IT Asset Management
The True Challenge of School Inventory Audits

Expert Insights
The True Challenge of School Inventory Audits
Simplify your K-12 school’s end-of-year inventory audits with Absolute’s streamlined device tracking. Maximize accuracy, reduce risk, and save time with powerful tools.
Endpoint Resilience
IT Asset Management
Compliance
The Growing Dangers of Unencrypted Devices

Expert Insights
The Growing Dangers of Unencrypted Devices
Zero Trust is essential for securing hybrid work. Discover how it strengthens endpoint security and minimizes risk in remote environments.
Endpoint Resilience
Remote Work
Zero Trust
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches

Expert Insights
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
There has been plenty of conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.
Data Protection
Resilience
Endpoint Resilience
The Accelerating Pace of Cyber Threats: A Historical Perspective

Expert Insights
The Accelerating Pace of Cyber Threats: A Historical Perspective
To get an appreciation of how technological development has accelerated, Absolute CTO Nicko van Someren takes a look at the timelines.
Resilience
Data Protection
Endpoint Resilience
Generative AI
Survey Says UK CISO's Top Threats are Ransomware and Mobile Work

Expert Insights
Survey Says UK CISO's Top Threats are Ransomware and Mobile Work
Survey reveals UK CISOs’ concerns about poor cyber resilience, AI risks, and the growing threat of ransomware ahead of Infosecurity Europe 2024.
Endpoint Resilience
Resilience
Ransomware
Remote Work
Sorry, no items found...