Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Ransomware – the Scourge of Our Times
Office workstation—highlighting endpoint management in enterprise settings.
Expert Insights

Ransomware – the Scourge of Our Times

Ransomware continues to pose a major threat to organizations globally. What matters is how prepared your organization is now and how quickly it can respond and recover.
Ransomware
Endpoint Resilience
Vulnerability and Patch Management
How Zero Trust Made the World Safe to Work From Anywhere
Zero Trust security model—illustrating identity-based access control.
Expert Insights

How Zero Trust Made the World Safe to Work From Anywhere

Endpoints not connected to the corporate domain represent a potential chink in the armor of the entire network. New research shows this number arising. Orgs should do more to protect and control remote access, such as adopting a zero trust strategy.
Data Protection
Endpoint Resilience
Remote Work
Zero Trust
Creating a Cybersecurity Culture with former Arsenal F.C IT Director, Christelle Heikkila
Team collaborating at desk—reinforcing secure business synergy.
Expert Insights

Creating a Cybersecurity Culture with former Arsenal F.C IT Director, Christelle Heikkila

Former Arsenal F.C IT Director, Christelle Heikkila gave a thought-provoking keynote speech to kick off our ‘CIO/CISO Roundtable on the Thames' event on the challenges of changing cyber security culture and reaping the benefits when done right.
Compliance
Digital Transformation
Resilience
Demand for ZTNA continues its upward trajectory in 2022
Remote team setup—emphasizing global secure collaboration tools.
Expert Insights

Demand for ZTNA continues its upward trajectory in 2022

With remote access becoming the norm, the priority for many IT teams has become sourcing secure access solutions that work for their teams.
Endpoint Resilience
Zero Trust
Compliance
Data Protection
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
Open laptop—illustrating remote work and endpoint security.
Expert Insights

The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches

There has been plenty of conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.
Data Protection
Resilience
Endpoint Resilience
When Data Insights Matter
Abstract data concept—illustrating secure data governance and analytics.
Expert Insights

When Data Insights Matter

As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.
Data Protection
Zero Trust
Endpoint Resilience
Why Data Sanitization Across Remote Endpoints Matters
Multiple laptops in office—depicting device management and security.
Expert Insights

Why Data Sanitization Across Remote Endpoints Matters

As part of the Absolute 7.18 product release, we have made significant enhancements to our Device Wipe and File Delete capabilities, giving organizations the ability to streamline data sanitization across their devices.
Data Protection
Endpoint Resilience
Remote Work
Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal
Digital work transition concept—visualizing the evolution of remote operations.
Expert Insights

Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal

We canvassed the opinion of 400 IT and security leaders in a bid to better quantify and understand how organizations are preparing for 2022. Here's what they had to say.
Data Protection
Endpoint Resilience
Remote Work
5 Cybersecurity Best Practices for K-12
School laptop in use—illustrating classroom technology and compliance.
Expert Insights

5 Cybersecurity Best Practices for K-12

K-12 schools face rising cyber threats, from ransomware to data breaches. Discover 5 top strategies to protect student data and secure your network.
Data Protection
Endpoint Resilience
Access Resilience
Enforcing Location Policies in Work- and Learn-from-Anywhere Environments
Laptop during travel—emphasizing mobile device security on the go.
Expert Insights

Enforcing Location Policies in Work- and Learn-from-Anywhere Environments

Unlock better security for your remote workforce with enhanced geolocation tracking and customizable geofencing, helping you stay ahead of evolving risks.
Remote Work
Endpoint Resilience
Data Protection
Emergency Connectivity Fund (ECF) Asset Management and Audit Preparedness Guide
Children using laptop—depicting cybersecurity in early digital education.
Expert Insights

Emergency Connectivity Fund (ECF) Asset Management and Audit Preparedness Guide

For the many schools still struggling to meet the challenges of remote learning, the Federal Communications Commission announced a second window to submit projects for coverage under the Emergency Connectivity Fund.
Endpoint Resilience
Data Protection
Compliance
Back to School: Safeguarding Student Data Privacy Must Be Top Priority This Year
Student on laptop—representing remote learning in secure digital classrooms.
Expert Insights

Back to School: Safeguarding Student Data Privacy Must Be Top Priority This Year

As K-12 schools shift to remote learning, student data privacy and endpoint security have become even more critical. Discover how IT teams can protect against cyber threats.
Data Protection
Endpoint Resilience
IT Asset Management