Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
When Data Insights Matter
Expert Insights

When Data Insights Matter

As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience
How Hybrid Work Expands the Threat Surface
Expert Insights

How Hybrid Work Expands the Threat Surface

Today's organisations have to manage a disparate workforce who want to access company resources from numerous locations and numerous devices. Traditional, on-premise security tools are no longer enough.
Data Protection
Endpoint Resilience
Remote Work
Integrated and Resilient Zero Trust: Essential to Modern Security and Compliance
Expert Insights

Integrated and Resilient Zero Trust: Essential to Modern Security and Compliance

A new Global Business Impact Brief from 451 Research, part of S&P Global Market, outlines the benefits that integrated and resilient Zero Trust delivers in the real world.
Data Protection
Zero Trust
Remote Work
Demand for ZTNA continues its upward trajectory in 2022
Expert Insights

Demand for ZTNA continues its upward trajectory in 2022

With remote access becoming the norm, the priority for many IT teams has become sourcing secure access solutions that work for their teams.
Endpoint Resilience
Zero Trust
Compliance
Data Protection
Embrace The Shadow IT Mindset Not The Shadow
Expert Insights

Embrace The Shadow IT Mindset Not The Shadow

It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
Threat Protection
Shadow IT
Application Resilience
Resilience
Healthcare Top Target Data Theft
Expert Insights

Healthcare Top Target Data Theft

88% of healthcare workers open phishing emails. Your data is at risk—here's how to protect it from cyber threats and secure patient information.
Compliance
Threat Protection
Ransomware
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Expert Insights

GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
Compliance
Data Protection
Threat Protection
What Is Cyber Resilience And How Can You Achieve It
Expert Insights

What Is Cyber Resilience And How Can You Achieve It

A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
Compliance
Endpoint Resilience
Resilience
Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal
Expert Insights

Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal

We canvassed the opinion of 400 IT and security leaders in a bid to better quantify and understand how organizations are preparing for 2022. Here's what they had to say.
Data Protection
Endpoint Resilience
Remote Work
Microsoft Patch Tuesday March 2025
Expert Insights

Microsoft Patch Tuesday March 2025

Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
Compliance
Resilience
Application Resilience
AI Moves Faster than Security, CISOs Say Resilience is Way Forward
Expert Insights

AI Moves Faster than Security, CISOs Say Resilience is Way Forward

With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
Resilience
Generative AI
Threat Protection
Why Data Sanitization Across Remote Endpoints Matters
Multiple laptops in office—depicting device management and security.
Expert Insights

Why Data Sanitization Across Remote Endpoints Matters

As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Data Protection
Endpoint Resilience
Remote Work
Sorry, no items found...