Expert Insights
Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.
Most recent
Explore our Blog Library
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
When Data Insights Matter

Expert Insights
When Data Insights Matter
As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience
How Hybrid Work Expands the Threat Surface

Expert Insights
How Hybrid Work Expands the Threat Surface
Today's organisations have to manage a disparate workforce who want to access company resources from numerous locations and numerous devices. Traditional, on-premise security tools are no longer enough.
Data Protection
Endpoint Resilience
Remote Work
Integrated and Resilient Zero Trust: Essential to Modern Security and Compliance

Expert Insights
Integrated and Resilient Zero Trust: Essential to Modern Security and Compliance
A new Global Business Impact Brief from 451 Research, part of S&P Global Market, outlines the benefits that integrated and resilient Zero Trust delivers in the real world.
Data Protection
Zero Trust
Remote Work
Demand for ZTNA continues its upward trajectory in 2022

Expert Insights
Demand for ZTNA continues its upward trajectory in 2022
With remote access becoming the norm, the priority for many IT teams has become sourcing secure access solutions that work for their teams.
Endpoint Resilience
Zero Trust
Compliance
Data Protection
Embrace The Shadow IT Mindset Not The Shadow

Expert Insights
Embrace The Shadow IT Mindset Not The Shadow
It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
Threat Protection
Shadow IT
Application Resilience
Resilience
Healthcare Top Target Data Theft

Expert Insights
Healthcare Top Target Data Theft
88% of healthcare workers open phishing emails. Your data is at risk—here's how to protect it from cyber threats and secure patient information.
Compliance
Threat Protection
Ransomware
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

Expert Insights
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
Compliance
Data Protection
Threat Protection
What Is Cyber Resilience And How Can You Achieve It

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
Compliance
Endpoint Resilience
Resilience
Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal

Expert Insights
Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal
We canvassed the opinion of 400 IT and security leaders in a bid to better quantify and understand how organizations are preparing for 2022. Here's what they had to say.
Data Protection
Endpoint Resilience
Remote Work
Microsoft Patch Tuesday March 2025

Expert Insights
Microsoft Patch Tuesday March 2025
Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
Compliance
Resilience
Application Resilience
AI Moves Faster than Security, CISOs Say Resilience is Way Forward

Expert Insights
AI Moves Faster than Security, CISOs Say Resilience is Way Forward
With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
Resilience
Generative AI
Threat Protection
Why Data Sanitization Across Remote Endpoints Matters

Expert Insights
Why Data Sanitization Across Remote Endpoints Matters
As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Data Protection
Endpoint Resilience
Remote Work
Sorry, no items found...