
Articles byAbsolute Editorial Team
This is some text inside of a div block.

Expert Insights
Microsoft Patch Tuesday April 2025
Microsoft’s April 2025 Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.
This is some text inside of a div block.

Expert Insights
Microsoft Patch Tuesday March 2025
As always, Patch Tuesday brings critical updates and security fixes to keep your systems protected. Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
This is some text inside of a div block.

Expert Insights
K-12 Peer Forum Offers Distance Learning Insight
Discover key insights from K-12 educational leaders on implementing effective distance learning strategies during unprecedented times.
This is some text inside of a div block.

Expert Insights
Microsoft Patch Tuesday February 2025: 53 Fixes, Including Weaponized Threats
However, size doesn’t always equate to impact as this month’s fixes include two actively exploited vulnerabilities and two publicly disclosed ones.
This is some text inside of a div block.

Inside Absolute
Absolute Ceo Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019
We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.
This is some text inside of a div block.

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
This is some text inside of a div block.

Expert Insights
4 Recent Data Breaches That Originated On The Endpoint
Let’s look at four recent breaches that originated on the endpoint to examine what you could do now to avoid a similar fate.
This is some text inside of a div block.

Products & Solutions
What Is Endpoint Management?
Endpoint management ensures secure connections between devices and networks, protecting against cyber threats. Learn why it’s critical to safeguard your endpoints in today’s digital world.
This is some text inside of a div block.

Products & Solutions
How Experts Track Stolen Laptops
At Absolute, we have the Investigations and Recovery Team to track and recover lost and stolen devices on behalf of our customers. Since the team’s formation in 1993, we have helped customers around the globe recover more than 50,000 lost or stolen laptops over the years. In FY2018 alone, the team investigated more than 15,000 laptop incidents and successfully recovered 67% of them.
This is some text inside of a div block.

Products & Solutions
How To Protect Your Data If A Laptop Is Lost Or Stolen
When a device goes missing, so does all of the sensitive data that resides on it. Do you have a plan in place for tracking devices and securing your information?
This is some text inside of a div block.

Expert Insights
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Earlier this week the UK announced how they plan to adopt the NIS Directive and some of the measures organizations must make to ensure compliance with the directive. The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – sectors like public utilities, power generators, transportation providers, and organizations providing healthcare for the public – all the basic services a nation needs to operate today.
No articles found for this author