Expert Insights

Expert Insights delivers in-depth analysis on cybersecurity trends, challenges, and solutions. Browse blog posts here for expert analysis on emerging threats and best practices.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Digital Resiliency is a Key Distance Learning KPI
Student typing at night—signifying cybersecurity for digital natives.
Expert Insights

Digital Resiliency is a Key Distance Learning KPI

Distance learning has proved to be a valuable part of a long-term strategy for student education. This means digital resiliency must become a key performance indicator in K-12.
Data Protection
Endpoint Resilience
IT Asset Management
5 Things to Look Out for to Avoid Buying a Stolen Laptop
Damaged laptop—representing risks of device loss and data exposure.
Expert Insights

How to Avoid Buying a Stolen Laptop: 5 Things to Know

Learn how to spot a stolen laptop and protect yourself from buying one. Ensure your devices are safe with these essential tips for secure purchases.
Endpoint Resilience
Data Protection
Threat Protection
4 Recent Data Breaches That Originated On The Endpoint
Woman working on laptop—enabling mobile productivity with strong security.
Expert Insights

4 Recent Data Breaches that Originated on the Endpoint

Let’s look at four recent breaches that originated on the endpoint to examine what you could do now to avoid a similar fate.
IT Asset Management
Endpoint Resilience
Threat Protection
How The Healthcare CISO Has Evolved
Healthcare CISO visual—highlighting security leadership in health IT.
Expert Insights

How the Healthcare CISO Has Evolved | Blog | Absolute Security

Healthcare CISOs are facing more challenges. Buying more security apps creates more complexity and reduces resilience. Absolute can help these CISOs make security work.
Data Protection
Threat Protection
Endpoint Resilience
5 Cybersecurity Best Practices for K-12
School laptop in use—illustrating classroom technology and compliance.
Expert Insights

5 Cybersecurity Best Practices for K-12 | Blog | Absolute Security

While strong cybersecurity strategies may seem out of reach for some schools, the solution doesn’t have to be complicated. Here are basic steps every school should take to build a solid foundation.
Data Protection
Endpoint Resilience
Access Resilience
How to Boost Your Resilience Against the Ransomware Epidemic in Healthcare
Healthcare professional with computer—depicting secure patient systems.
Expert Insights

Boost Your Resilience: The Ransomware Epidemic in Healthcare

More than 90% of all healthcare organizations reported at least one security breach over the last three years in the United States.
Endpoint Resilience
IT Asset Management
Ransomware
What Is Cyber Resilience And How Can You Achieve It
Executive boardroom—illustrating governance and cyber decision-making.
Expert Insights

What is Cyber Resilience & How Can You Achieve It?

A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
Compliance
Endpoint Resilience
Resilience
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Businessman using laptop—portraying corporate cybersecurity awareness.
Expert Insights

UK Adopts NIS Directive - Learn about Compliance

Earlier this week the UK announced how they plan to adopt the NIS Directive and some of the measures organizations must make to ensure compliance with the directive. The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – sectors like public utilities, power generators, transportation providers, and organizations providing healthcare for the public – all the basic services a nation needs to operate today.
Compliance
Data Protection
Threat Protection
3 Critical Shifts Transforming the Education IT Landscape
Student using a laptop in class to support secure digital learning.
Expert Insights

3 Critical Shifts Transforming the Education IT Landscape

With a growing reliance on devices during distance learning, there are 3 structural industry shifts that will continue to impact education in the school years to come.
Endpoint Resilience
IT Asset Management
Application Resilience
The True Challenge of School Inventory Audits
Student studying remotely—representing digital literacy and secure access.
Expert Insights

Streamline School Inventory Audits in 2025 with Absolute

Simplify K-12 device audits with Absolute’s cybersecurity solutions. Improve accuracy, security, and efficiency for school inventory collection in 2025.
Endpoint Resilience
IT Asset Management
Compliance
The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
Open laptop—illustrating remote work and endpoint security.
Expert Insights

A Look at High Profile Data Breaches

There has been plenty of hindsight-biased conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.
Data Protection
Resilience
Endpoint Resilience
What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Strategic planning meeting—emphasizing cybersecurity roadmap creation.
Expert Insights

What Enterprises Need to Plan for In 2021 for Endpoint Security

Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021 which includes closely managing every stage of the device lifecycle.
Data Protection
Endpoint Resilience
Remote Work
Sorry, no items found...