Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
The Accelerating Pace of Cyber Threats: A Historical Perspective
AI workspace with ChatGPT—focusing on artificial intelligence in cybersecurity.
Expert Insights

The Accelerating Pace of Cyber Threats: A Historical Perspective

To get an appreciation of how technological development has accelerated, Absolute CTO Nicko van Someren takes a look at the timelines.
Resilience
Data Protection
Endpoint Resilience
Generative AI
A Modern View on Achieving Risk-Based Compliance Strategy
Compliance report header—supporting audit readiness and regulatory alignment.
Expert Insights

A Modern View on Achieving Risk-Based Compliance Strategy

Compliance alone isn’t enough. The most effective defense is a risk-based strategy that aligns with your organization’s data protection needs and emerging threats.
Compliance
Data Protection
Endpoint Resilience
Cybersecurity Awareness Series: Enterprise Security Controls
Cybersecurity concept with a digital lock icon
Expert Insights

Cybersecurity Awareness Series: Enterprise Security Controls

While enterprise security controls are many, and well-meaning, if they go unmonitored on endpoints, they can easily degrade and become compromised. Here's what can be done about it.
Data Protection
Endpoint Resilience
Threat Protection
What's in Store for Cybersecurity in 2023
Working from the beach—highlighting secure remote work from anywhere.
Expert Insights

What's in Store for Cybersecurity in 2023

As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.
Endpoint Resilience
Remote Work
Ransomware
Cybersecurity Awareness Series: Risk Is Inherent in the Modern Workforce
Person working remotely on a laptop in a cozy setting
Expert Insights

Cybersecurity Awareness Series: Risk Is Inherent in the Modern Workforce

Risk is inherent in the modernized workforce. Many employees rely on sensitive information to do their jobs effectively and many travel and connect from multiple locations per day. Visibility and endpoint security controls are critical.
Data Protection
Endpoint Resilience
Remote Work
Integrated and Resilient Zero Trust: Essential to Modern Security and Compliance
Research team in discussion—highlighting secure data collaboration.
Expert Insights

Integrated and Resilient Zero Trust: Essential to Modern Security and Compliance

A new Global Business Impact Brief from 451 Research, part of S&P Global Market, outlines the benefits that integrated and resilient Zero Trust delivers in the real world.
Data Protection
Zero Trust
Remote Work
Cybersecurity Awareness Series: Endpoint Attack Surface Grows as Vulnerabilities Remain Unaddressed
Woman working on a laptop, representing cybersecurity awareness
Expert Insights

Cybersecurity Awareness Series: Endpoint Attack Surface Grows as Vulnerabilities Remain Unaddressed

Absolute's 3-part cybersecurity awareness series empowers organizations with key indicators pulled from our technology that is embedded in the firmware of more than 600 million devices.
Data Protection
Endpoint Resilience
Resilience
IT Asset Management
Reliable Communications for the Work-from-Anywhere Era
Office collaboration—representing teamwork in digital-first workplaces.
Expert Insights

Reliable Communications for the Work-from-Anywhere Era

IT practitioners are required to send timely communications with end users for a variety of reasons like upcoming events and security warnings. Absolute's enhancements for End User Messaging makes these communications simpler and more engaging.
Endpoint Resilience
Remote Work
Data Protection
How Hybrid Work Expands the Threat Surface
Woman working remotely—representing modern digital workforce security.
Expert Insights

How Hybrid Work Expands the Threat Surface

Today's organisations have to manage a disparate workforce who want to access company resources from numerous locations and numerous devices. Traditional, on-premise security tools are no longer enough.
Data Protection
Endpoint Resilience
Remote Work
4 Myths of Zero Trust
Multiple laptops on desk—highlighting scalable device management needs.
Expert Insights

4 Myths of Zero Trust

To separate marketing hype from reality, here are common myths and misconceptions around Zero Trust.
Data Protection
Endpoint Resilience
Zero Trust
Remote Work
Dark Endpoints: An Invisible Threat to Your IT Team
Multiple laptops—representing cross-platform device security.
Expert Insights

Dark Endpoints: An Invisible Threat to Your IT Team

Dark endpoints are a hidden threat to cybersecurity. Discover how to secure them and protect your business data from breaches and potential attacks.
Data Protection
Endpoint Resilience
Zero Trust
The Growing Dangers of Unencrypted Devices
Array of laptops—depicting IT asset visibility in organizations.
Expert Insights

The Growing Dangers of Unencrypted Devices

Zero Trust is essential for securing hybrid work. Discover how it strengthens endpoint security and minimizes risk in remote environments.
Endpoint Resilience
Remote Work
Zero Trust