Expert Insights
Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.
Explore our Blog Library
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
What’s Your Strategy for Collecting Student Devices?

Expert Insights
What’s Your Strategy for Collecting Student Devices?
K-12 student device collection was already a complex process before the rapid shift to distance learning. Thankfully, there are a few approaches you can take to ease the collection process.
IT Asset Management
Endpoint Resilience
Vulnerability and Patch Management
Survey Says UK CISO's Top Threats are Ransomware and Mobile Work

Expert Insights
Survey Says UK CISO's Top Threats are Ransomware and Mobile Work
Survey reveals UK CISOs’ concerns about poor cyber resilience, AI risks, and the growing threat of ransomware ahead of Infosecurity Europe 2024.
Endpoint Resilience
Resilience
Ransomware
Remote Work
The Accelerating Pace of Cyber Threats: A Historical Perspective

Expert Insights
The Accelerating Pace of Cyber Threats: A Historical Perspective
To get an appreciation of how technological development has accelerated, Absolute CTO Nicko van Someren takes a look at the timelines.
Resilience
Data Protection
Endpoint Resilience
Generative AI
5 Steps To Streamline Student Device Collection

Expert Insights
5 Steps To Streamline Student Device Collection
Simplify your K-12 device collection process with Absolute. Secure, track, and recover devices remotely with an easy-to-use platform that boosts efficiency.
Data Protection
IT Asset Management
Endpoint Resilience
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

Expert Insights
Gdpr Keeping Theres Another Monster Hiding Bed
The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
Compliance
Data Protection
Threat Protection
4 Myths of Zero Trust

Expert Insights
4 myths of zero trust
To separate marketing hype from reality, here are common myths and misconceptions around Zero Trust.
Data Protection
Endpoint Resilience
Zero Trust
Remote Work
How The Healthcare CISO Has Evolved

Expert Insights
How The Healthcare CISO Has Evolved
Cybersecurity is no longer enough for healthcare organizations. CISOs must now prioritize cyber resilience to protect sensitive data and ensure continuous care in 2025.
Data Protection
Threat Protection
Endpoint Resilience
A Modern View on Achieving Risk-Based Compliance Strategy

Expert Insights
A Modern View on Achieving Risk-Based Compliance Strategy
Compliance alone isn’t enough. The most effective defense is a risk-based strategy that aligns with your organization’s data protection needs and emerging threats.
Compliance
Data Protection
Endpoint Resilience
The True Challenge of School Inventory Audits

Expert Insights
The True Challenge of School Inventory Audits
Simplify your K-12 school’s end-of-year inventory audits with Absolute’s streamlined device tracking. Maximize accuracy, reduce risk, and save time with powerful tools.
Endpoint Resilience
IT Asset Management
Compliance
Embrace The Shadow It Mindset Not The Shadow

Expert Insights
Embrace The Shadow It Mindset Not The Shadow
It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
Threat Protection
Shadow IT
Application Resilience
Resilience
5 Cybersecurity Best Practices for K-12

Expert Insights
5 Cybersecurity Best Practices for K-12
K-12 schools face rising cyber threats, from ransomware to data breaches. Discover 5 top strategies to protect student data and secure your network.
Data Protection
Endpoint Resilience
Access Resilience
5 Things to Look Out for to Avoid Buying a Stolen Laptop

Expert Insights
5 Things to Look Out for to Avoid Buying a Stolen Laptop
Avoid buying a stolen laptop by knowing the red flags and understanding the risks to your data and security. Follow these 5 tips to stay protected.
Endpoint Resilience
Data Protection
Threat Protection
Sorry, no items found...