Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Why Data Sanitization Across Remote Endpoints Matters
Multiple laptops in office—depicting device management and security.
Expert Insights

Why Data Sanitization Across Remote Endpoints Matters

As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Data Protection
Endpoint Resilience
Remote Work
When Data Insights Matter
Abstract data concept—illustrating secure data governance and analytics.
Expert Insights

When Data Insights Matter

As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience
What Is Cyber Resilience And How Can You Achieve It
Executive boardroom—illustrating governance and cyber decision-making.
Expert Insights

What Is Cyber Resilience And How Can You Achieve It

A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
Compliance
Endpoint Resilience
Resilience
What's in Store for Cybersecurity in 2023
Working from the beach—highlighting secure remote work from anywhere.
Expert Insights

What's in Store for Cybersecurity in 2023

As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.
Endpoint Resilience
Remote Work
Ransomware
What’s Your Strategy for Collecting Student Devices?
Child using laptop—focusing on digital safety for young learners.
Expert Insights

What’s Your Strategy for Collecting Student Devices?

K-12 student device collection was already a complex process before the rapid shift to distance learning. Thankfully, there are a few approaches you can take to ease the collection process.
IT Asset Management
Endpoint Resilience
Vulnerability and Patch Management
What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Strategic planning meeting—emphasizing cybersecurity roadmap creation.
Expert Insights

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021 which includes closely managing every stage of the device lifecycle.
Data Protection
Endpoint Resilience
Remote Work
The Parents’ Perspective: Insights into Distance Learning and Security
Parent assisting child on laptop—showcasing family digital safety at home.
Expert Insights

The Parents’ Perspective: Insights into Distance Learning and Security

As we approach the mid-way mark of the 2020-2021 school year, distance learning remains an instructional delivery cornerstone for most schools in one way or another. How are we actually doing?
Data Protection
Endpoint Resilience
IT Asset Management
The True Challenge of School Inventory Audits
Student studying remotely—representing digital literacy and secure access.
Expert Insights

The True Challenge of School Inventory Audits

Simplify your K-12 school’s end-of-year inventory audits with Absolute’s streamlined device tracking. Maximize accuracy, reduce risk, and save time with powerful tools.
Endpoint Resilience
IT Asset Management
Compliance
The Growing Dangers of Unencrypted Devices
Array of laptops—depicting IT asset visibility in organizations.
Expert Insights

The Growing Dangers of Unencrypted Devices

Zero Trust is essential for securing hybrid work. Discover how it strengthens endpoint security and minimizes risk in remote environments.
Endpoint Resilience
Remote Work
Zero Trust
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
Open laptop—illustrating remote work and endpoint security.
Expert Insights

The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches

There has been plenty of conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.
Data Protection
Resilience
Endpoint Resilience
The Accelerating Pace of Cyber Threats: A Historical Perspective
AI workspace with ChatGPT—focusing on artificial intelligence in cybersecurity.
Expert Insights

The Accelerating Pace of Cyber Threats: A Historical Perspective

To get an appreciation of how technological development has accelerated, Absolute CTO Nicko van Someren takes a look at the timelines.
Resilience
Data Protection
Endpoint Resilience
Generative AI
Survey Says UK CISO's Top Threats are Ransomware and Mobile Work
UK cyber resilience—illustrating national strategies for digital defense.
Expert Insights

Survey Says UK CISO's Top Threats are Ransomware and Mobile Work

Survey reveals UK CISOs’ concerns about poor cyber resilience, AI risks, and the growing threat of ransomware ahead of Infosecurity Europe 2024.
Endpoint Resilience
Resilience
Ransomware
Remote Work
Sorry, no items found...