Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
What’s Your Strategy for Collecting Student Devices?
Child using laptop—focusing on digital safety for young learners.
Expert Insights

What’s Your Strategy for Collecting Student Devices?

K-12 student device collection was already a complex process before the rapid shift to distance learning. Thankfully, there are a few approaches you can take to ease the collection process.
IT Asset Management
Endpoint Resilience
Vulnerability and Patch Management
Survey Says UK CISO's Top Threats are Ransomware and Mobile Work
UK cyber resilience—illustrating national strategies for digital defense.
Expert Insights

Survey Says UK CISO's Top Threats are Ransomware and Mobile Work

Survey reveals UK CISOs’ concerns about poor cyber resilience, AI risks, and the growing threat of ransomware ahead of Infosecurity Europe 2024.
Endpoint Resilience
Resilience
Ransomware
Remote Work
The Accelerating Pace of Cyber Threats: A Historical Perspective
AI workspace with ChatGPT—focusing on artificial intelligence in cybersecurity.
Expert Insights

The Accelerating Pace of Cyber Threats: A Historical Perspective

To get an appreciation of how technological development has accelerated, Absolute CTO Nicko van Someren takes a look at the timelines.
Resilience
Data Protection
Endpoint Resilience
Generative AI
5 Steps To Streamline Student Device Collection
Focused student with laptop—emphasizing endpoint protection in education.
Expert Insights

5 Steps To Streamline Student Device Collection

Simplify your K-12 device collection process with Absolute. Secure, track, and recover devices remotely with an easy-to-use platform that boosts efficiency.
Data Protection
IT Asset Management
Endpoint Resilience
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Businessman using laptop—portraying corporate cybersecurity awareness.
Expert Insights

Gdpr Keeping Theres Another Monster Hiding Bed

The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
Compliance
Data Protection
Threat Protection
4 Myths of Zero Trust
Multiple laptops on desk—highlighting scalable device management needs.
Expert Insights

4 myths of zero trust

To separate marketing hype from reality, here are common myths and misconceptions around Zero Trust.
Data Protection
Endpoint Resilience
Zero Trust
Remote Work
How The Healthcare CISO Has Evolved
Healthcare CISO visual—highlighting security leadership in health IT.
Expert Insights

How The Healthcare CISO Has Evolved

Cybersecurity is no longer enough for healthcare organizations. CISOs must now prioritize cyber resilience to protect sensitive data and ensure continuous care in 2025.
Data Protection
Threat Protection
Endpoint Resilience
A Modern View on Achieving Risk-Based Compliance Strategy
Compliance report header—supporting audit readiness and regulatory alignment.
Expert Insights

A Modern View on Achieving Risk-Based Compliance Strategy

Compliance alone isn’t enough. The most effective defense is a risk-based strategy that aligns with your organization’s data protection needs and emerging threats.
Compliance
Data Protection
Endpoint Resilience
The True Challenge of School Inventory Audits
Student studying remotely—representing digital literacy and secure access.
Expert Insights

The True Challenge of School Inventory Audits

Simplify your K-12 school’s end-of-year inventory audits with Absolute’s streamlined device tracking. Maximize accuracy, reduce risk, and save time with powerful tools.
Endpoint Resilience
IT Asset Management
Compliance
Embrace The Shadow It Mindset Not The Shadow
Malware concept illustration—highlighting digital threats and endpoint defense.
Expert Insights

Embrace The Shadow It Mindset Not The Shadow

It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
Threat Protection
Shadow IT
Application Resilience
Resilience
5 Cybersecurity Best Practices for K-12
School laptop in use—illustrating classroom technology and compliance.
Expert Insights

5 Cybersecurity Best Practices for K-12

K-12 schools face rising cyber threats, from ransomware to data breaches. Discover 5 top strategies to protect student data and secure your network.
Data Protection
Endpoint Resilience
Access Resilience
5 Things to Look Out for to Avoid Buying a Stolen Laptop
Damaged laptop—representing risks of device loss and data exposure.
Expert Insights

5 Things to Look Out for to Avoid Buying a Stolen Laptop

Avoid buying a stolen laptop by knowing the red flags and understanding the risks to your data and security. Follow these 5 tips to stay protected.
Endpoint Resilience
Data Protection
Threat Protection
Sorry, no items found...