Absolute Editorial Team

Blog Author:
Absolute Editorial Team

Absolute Editorial Team

Absolute Security's editorial team brings you in-depth analysis on cybersecurity trends, challenges, and solutions.

Read more

Articles by
Absolute Editorial Team

This is some text inside of a div block.
Expert Insights

Microsoft Patch Tuesday April 2025

Microsoft’s April 2025 Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.
This is some text inside of a div block.
March Patch Tuesday roll-up—visualizing ongoing cybersecurity hygiene.
Expert Insights

Microsoft Patch Tuesday March 2025

As always, Patch Tuesday brings critical updates and security fixes to keep your systems protected. Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
This is some text inside of a div block.
Student with laptop at desk—portraying secure online learning practices.
Expert Insights

K-12 Peer Forum Offers Distance Learning Insight

Discover key insights from K-12 educational leaders on implementing effective distance learning strategies during unprecedented times.
This is some text inside of a div block.
February Patch Tuesday summary—highlighting critical security updates.
Expert Insights

Microsoft Patch Tuesday February 2025: 53 Fixes, Including Weaponized Threats

However, size doesn’t always equate to impact as this month’s fixes include two actively exploited vulnerabilities and two publicly disclosed ones.
This is some text inside of a div block.
Hands on keyboard—highlighting secure access and real-time device usage.
Inside Absolute

Absolute Ceo Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019

We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.
This is some text inside of a div block.
Executive boardroom—illustrating governance and cyber decision-making.
Expert Insights

What Is Cyber Resilience And How Can You Achieve It

A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
This is some text inside of a div block.
Woman working on laptop—enabling mobile productivity with strong security.
Expert Insights

4 Recent Data Breaches That Originated On The Endpoint

Let’s look at four recent breaches that originated on the endpoint to examine what you could do now to avoid a similar fate.
This is some text inside of a div block.
Digital interface concept—representing transformation and cyber innovation.
Products & Solutions

What Is Endpoint Management?

Endpoint management ensures secure connections between devices and networks, protecting against cyber threats. Learn why it’s critical to safeguard your endpoints in today’s digital world.
This is some text inside of a div block.
Hacked system alert—illustrating consequences of compromised security.
Products & Solutions

How Experts Track Stolen Laptops

At Absolute, we have the Investigations and Recovery Team to track and recover lost and stolen devices on behalf of our customers. Since the team’s formation in 1993, we have helped customers around the globe recover more than 50,000 lost or stolen laptops over the years. In FY2018 alone, the team investigated more than 15,000 laptop incidents and successfully recovered 67% of them.
This is some text inside of a div block.
Close-up of modern laptop—representing endpoint protection in business.
Products & Solutions

How To Protect Your Data If A Laptop Is Lost Or Stolen

When a device goes missing, so does all of the sensitive data that resides on it. Do you have a plan in place for tracking devices and securing your information?
This is some text inside of a div block.
Businessman using laptop—portraying corporate cybersecurity awareness.
Expert Insights

GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

Earlier this week the UK announced how they plan to adopt the NIS Directive and some of the measures organizations must make to ensure compliance with the directive. The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – sectors like public utilities, power generators, transportation providers, and organizations providing healthcare for the public – all the basic services a nation needs to operate today.
This is some text inside of a div block.
Stethoscope on keyboard—symbolizing cybersecurity in healthcare IT.
Expert Insights

Healthcare Top Target Data Theft

Healthcare: Top Target for Data Theft
No articles found for this author