Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Cybersecurity Awareness Series: Endpoint Attack Surface Grows as Vulnerabilities Remain Unaddressed
Woman working on a laptop, representing cybersecurity awareness
Expert Insights

Cybersecurity Awareness Series: Endpoint Attack Surface Grows as Vulnerabilities Remain Unaddressed

Absolute's 3-part cybersecurity awareness series empowers organizations with key indicators pulled from our technology that is embedded in the firmware of more than 600 million devices.
Data Protection
Endpoint Resilience
Resilience
IT Asset Management
Reliable Communications for the Work-from-Anywhere Era
Office collaboration—representing teamwork in digital-first workplaces.
Expert Insights

Reliable Communications for the Work-from-Anywhere Era

IT practitioners are required to send timely communications with end users for a variety of reasons like upcoming events and security warnings. Absolute's enhancements for End User Messaging makes these communications simpler and more engaging.
Endpoint Resilience
Remote Work
Data Protection
How Hybrid Work Expands the Threat Surface
Woman working remotely—representing modern digital workforce security.
Expert Insights

How Hybrid Work Expands the Threat Surface

Today's organisations have to manage a disparate workforce who want to access company resources from numerous locations and numerous devices. Traditional, on-premise security tools are no longer enough.
Data Protection
Endpoint Resilience
Remote Work
4 Myths of Zero Trust
Multiple laptops on desk—highlighting scalable device management needs.
Expert Insights

4 Myths of Zero Trust

To separate marketing hype from reality, here are common myths and misconceptions around Zero Trust.
Data Protection
Endpoint Resilience
Zero Trust
Remote Work
Dark Endpoints: An Invisible Threat to Your IT Team
Multiple laptops—representing cross-platform device security.
Expert Insights

Dark Endpoints: An Invisible Threat to Your IT Team

Dark endpoints are a hidden threat to cybersecurity. Discover how to secure them and protect your business data from breaches and potential attacks.
Data Protection
Endpoint Resilience
Zero Trust
The Growing Dangers of Unencrypted Devices
Array of laptops—depicting IT asset visibility in organizations.
Expert Insights

The Growing Dangers of Unencrypted Devices

Zero Trust is essential for securing hybrid work. Discover how it strengthens endpoint security and minimizes risk in remote environments.
Endpoint Resilience
Remote Work
Zero Trust
Ransomware – the Scourge of Our Times
Office workstation—highlighting endpoint management in enterprise settings.
Expert Insights

Ransomware – the Scourge of Our Times

Ransomware continues to pose a major threat to organizations globally. What matters is how prepared your organization is now and how quickly it can respond and recover.
Ransomware
Endpoint Resilience
Vulnerability and Patch Management
How Zero Trust Made the World Safe to Work From Anywhere
Zero Trust security model—illustrating identity-based access control.
Expert Insights

How Zero Trust Made the World Safe to Work From Anywhere

Endpoints not connected to the corporate domain represent a potential chink in the armor of the entire network. New research shows this number arising. Orgs should do more to protect and control remote access, such as adopting a zero trust strategy.
Data Protection
Endpoint Resilience
Remote Work
Zero Trust
Creating a Cybersecurity Culture with former Arsenal F.C IT Director, Christelle Heikkila
Team collaborating at desk—reinforcing secure business synergy.
Expert Insights

Creating a Cybersecurity Culture with former Arsenal F.C IT Director, Christelle Heikkila

Former Arsenal F.C IT Director, Christelle Heikkila gave a thought-provoking keynote speech to kick off our ‘CIO/CISO Roundtable on the Thames' event on the challenges of changing cyber security culture and reaping the benefits when done right.
Compliance
Digital Transformation
Resilience
Demand for ZTNA continues its upward trajectory in 2022
Remote team setup—emphasizing global secure collaboration tools.
Expert Insights

Demand for ZTNA continues its upward trajectory in 2022

With remote access becoming the norm, the priority for many IT teams has become sourcing secure access solutions that work for their teams.
Endpoint Resilience
Zero Trust
Compliance
Data Protection
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
Open laptop—illustrating remote work and endpoint security.
Expert Insights

The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches

There has been plenty of conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.
Data Protection
Resilience
Endpoint Resilience
When Data Insights Matter
Abstract data concept—illustrating secure data governance and analytics.
Expert Insights

When Data Insights Matter

As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience