Absolute Security in the News
2024
December 18, 2024
Key strategies to enhance cyber resilienceSeptember 5, 2024
Absolute acquires Syxsense to expand automated endpoint securityJune 19, 2024
Cyber Resilience In Today’s Threat EnvironmentJune 5, 2024
Staff working from home are companies' 'biggest weakness' in fight against cybercrime, bosses warnJanuary 4, 2024
Importance of Cyber Resilience in Incident Response Planning2023
December 13, 2023
Cyber industry leaders debate AI threat in ParliamentDecember 12, 2023
5 IT Companies in Vancouver to KnowNovember 30, 2023
The pressing need for self-healing apps and network resilienceNovember 29, 2023
Five Cybersecurity Predictions for 2024November 3, 2023
Digital Health Coffee Time BriefingNovember 2, 2023
Reaching consensus on AI governanceNovember 2, 2023
Absolute’s New Application Health Monitoring Extends Cyber Resilience To Endpoint Security And Productivity ApplicationsNovember 1, 2023
UK Government launches cyber-resiliency inquiryOctober 31, 2023
Scary Security Stats: Roundup from 2023 ResearchOctober 26, 2023
Innovation of Cybersecurity Through the Use of AIOctober 25, 2023
Now is the time for self-healing systems in healthcareOctober 19, 2023
Digital minister Paul Scully addresses tech chiefs in ParliamentOctober 18, 2023
Empowering remote workers through secure accessOctober 18, 2023
Lost and Stolen Devices: A Gateway to Data Breaches and LeaksOctober 16, 2023
A deep dive on cybersecurity with Absolute Software and Rapid7 ❘ Netskope talks borderless WANOctober 10, 2023
Cybersecurity Month Starts With a BangOctober 10, 2023
The key to cyberattack recovery is resilience and the key to resilience is hiding in your BIOS all alongOctober 9, 2023
A mixed response on EU’s new vulnerability disclosure rulesOctober 9, 2023
Podcast: Demystifying artificial intelligence in cyber security, with Absolute Software's Nicko van SomerenSeptember 29, 2023
Palo Alto Networks, Microsoft, Check Point lead Forrester’s zero-trust wave - SDxCentralSeptember 28, 2023
Daily Briefing for 09.28.23: A look at the Budworm APT. Johnson Controls cyber incident. Section 702. Hacktivist auxiliary hits Russian airlinesSeptember 28, 2023
10 Minute IT Jams - An update from Absolute Software in 2023September 26, 2023
How to Make Sure Your Security Controls are Doing Their JobsSeptember 21, 2023
Navigating the Digital Frontier in Cybersecurity Awareness Month 2023September 15, 2023
Absolute recognised as ZTNA representative vendor by GartnerSeptember 15, 2023
Security leaders share thoughts on MGM cyberattackSeptember 14, 2023
MGM Resorts shuts down some systems because of a “cybersecurity issue.” (Updated.)August 30, 2023
International law enforcement hits Qakbot. Developments in the cybercriminal underworld. Cyberespionage and notes on a hybrid war.August 30, 2023
Absolute Software Expands Application Resilience EcosystemJuly 27, 2023
Cybercrime updates: Tomcat, CardioComm hit. Risk management practices. Workforce skill gaps. Hybrid war update.July 17, 2023
How AI can improve the future of incident responseJuly 12, 2023
MOVEit: Testing the Limits of Supply Chain SecurityJuly 10, 2023
Analysts: Cybersecurity Funding Set for ReboundJune 15, 2023
Absolute Software Adds Secure Web Gateway Service to its Differentiated Security Service Edge SolutionApril 26, 2023
Cyberespionage TTPs, from Tehran and Beijing. SLP exploitation. Ransomware as an international threat. Hacktivist updateApril 12, 2023
IT resilience: 3 myths debunkedApril 12, 2023
Defending against backdoor attacks with zero trustApril 5, 2023
More Signal. Less NoiseMarch 30, 2023
Why Endpoint Resilience MattersMarch 20, 2023
Defining endpoint security in a zero-trust worldMarch 10, 2023
Why Zero Trust is the Future of Endpoint SecurityMarch 8, 2023
Cyber Resilience More Than a Software ProblemMarch 1, 2023
LastPass sustains a second data breachMarch 1, 2023
Ransomware Attacks: Don’t Let Your Guard DownFebruary 14, 2023
CISOs: Self-healing endpoints key to consolidating tech stacks, improving cyber-resiliencyFebruary 10, 2023
5 steps to deal with the inevitable data breaches of 2023February 8, 2023
Do You Need EDR if You Already Have a Firewall?February 6, 2023
Getting results from your zero-trust initiatives in 2023January 27, 2023
10 steps every business can take to avoid a cybersecurity breachJanuary 25, 2023
Password Dependency: How to Break the CycleJanuary 12, 2023
Absolute Software Earns FedRAMP-Ready DesignationJanuary 11, 2023
BART suffers ransomware attack at the hands of Vice SocietyJanuary 10, 2023
5 ways endpoints are turbocharging cybersecurity innovation2022
December 14, 2022
10 Actionable Data Trends in 2023 To Nail Your AnalyticsNovember 2, 2022
The Importance of Self-Healing Cybersecurity SolutionsOctober 14, 2022
Which cybersecurity metrics matter most to CISOs today?October 11, 2022
CISO Choice Awards Finalists 2022October 7, 2022
Why web apps are one of this year’s leading attack vectorsOctober 5, 2022
Is the Cybersecurity Industry Positioned Well for Success Despite Global Economic Challenges?October 5, 2022
Alice Hansen joins Absolute as CMOSeptember 23, 2022
"Left and Right of Boom" - Having a Winning StrategySeptember 20, 2022
Uber sees Lapsus$'s hand in its hack. Trends in resilience and quantum security. Updates from Russia's hybrid war.September 20, 2022
Absolute and Trellix join forces to strengthen endpoint security posture for organizationsSeptember 19, 2022
Absolute Software adds Trellix Endpoint SecuritySeptember 19, 2022
How zero trust can improve mobile securityAugust 30, 2022
Faddis: With a strengthening dollar, investors should avoid loss-making growth stocksAugust 30, 2022
Has Absolute Software (ABST) Outpaced Other Computer and Technology Stocks This Year?August 29, 2022
Building a resilient cybersecurity program is like having another IT person: Absolute Software CEOAugust 24, 2022
How leaders can (and should) overcommunicateAugust 24, 2022
How cybersecurity vendors are misrepresenting zero trustAugust 19, 2022
Absolute Software’s latest release increases cyber protection and threat visibility for remote workAugust 19, 2022
Absolute boosts Secure Endpoint portfolio with resilience and intelligence capabilitiesJune 30, 2022
Endpoint Security and Network Monitoring News for June 2022; Updates from Absolute, Netskope, Ordr, and MoreApril 27, 2022
How AI can close gaps in cybersecurity tech stacksApril 21, 2022
Absolute Software launches Absolute Ransomware Response to help mitigate ransomware risks and increase endpoint recoveryApril 21, 2022
Why Ransomware Response Matters More Than ProtectionApril 20, 2022
Absolute Software Introduces Ransomware Response Offering amidst growing cyber concernsApril 19, 2022
Absolute Software launches ransomware response offering to accelerate endpoint recoverApril 18, 2022
Absolute Software Releases Ransomware Response SolutionApril 15, 2022
10 things CISOs need to know about zero trustApril 15, 2022
ICS threats and mitigations. News from cyber gangland, and an indictment in an influence ops case.April 8, 2022
Russian disinformation and cyber ops in its hybrid war. Meta takedowns. Power grid threats.April 7, 2022
Absolute announces product enhancements to improve zero trust security posture for organizationsApril 7, 2022
Absolute Software Announces New Product InnovationsApril 7, 2022
Absolute Software appoints Orca Tech as distributorMarch 31, 2022
Absolute Software Delivers Unparalleled Device and Network Intelligence with New Product InnovationsMarch 30, 2022
The Need for Resilient Zero TrustMarch 28, 2022
Private Credit, Investing, And CybersecurityMarch 1, 2022
BBC blasted with millions of malicious emailsMarch 1, 2022
BBC facing almost 400,000 email attacks a dayMarch 1, 2022
Absolute Software Completes SOC 2 Type 1 Certification for NetMotion Platform (iTechnology Series)March 1, 2022
Absolute Software Completes SOC 2 Type 1 Certification for NetMotion Platform (The Cyberwire Daily Briefing)February 22, 2022
Taxman spends hundreds of thousands replacing lost laptopsFebruary 9, 2022
Investing, Gaming, and CybersecurityJanuary 28, 2022
In the Hacker's Crosshairs: K-12 SchoolsJanuary 20, 2022
Zero-trust trends for 2022January 3, 2022
Top 5 trends for endpoint security in 20222021
December 21, 2021
Leadership in a Remote World: Looking Back at 2021December 15, 2021
3 Things Your Best Employees Desperately Need (But Won't Tell You)December 14, 2021
10 Cloud Security Trends That Will Shape 2022 and BeyondDecember 10, 2021
1 Forgotten Strategy That Will Keep Your Employees from Joining the Great ResignationDecember 8, 2021
3 AI Trends to Watch in K–12 Educational Technology for 2022December 7, 2021
Protecting school devices in the age of digital learningDecember 7, 2021
Zero trust network access should be on every CISO’s SASE roadmapDecember 1, 2021
How Can You Tell Someone Has What It Takes to Keep Employees from Quitting? Look for 3 HabitsDecember 1, 2021
Prediction Season: What's in Store for Cybersecurity in 2022?November 15, 2021
The Virtual Care Paradigm: Going beyond telehealth for the future – and present – of careNovember 11, 2021
Biometrics providers deploy Absolute Software technology for ‘self-healing’ applicationsNovember 10, 2021
Absolute releases Application Persistence-as-a-Service to strengthen their mission-critical appsOctober 29, 2021
Hybrid work's next phase: 3 lessons for CIOsOctober 28, 2021
Absolute unveils zero trust platform to monitor mission-critical security applicationsOctober 28, 2021
Absolute Enables Customers' Shift to Work-from-Anywhere With the Industry's First Self-Healing Zero Trust Platform (VM Blog)October 25, 2021
Security leaders facing challenges in managing and securing distributed work environmentsOctober 21, 2021
How to secure the virtual care visitOctober 14, 2021
Met Police Loses 2280 Electronic Devices Over Two-Year PeriodOctober 6, 2021
Securing the Virtual Care VisitSeptember 30, 2021
Educational targets hit by rising cyberattacks in 2021September 30, 2021
You're Going to Be the Victim of a Ransomware AttackSeptember 28, 2021
Absolute’s geolocation capabilities enable organizations to strengthen device and data securitySeptember 28, 2021
Torsten George, Absolute Software: schools are now the top target for ransomware attackersSeptember 27, 2021
How an Ugly Award and Strong Values Built a Sticky CultureSeptember 12, 2021
Zero-trust security could reduce cyber trust gapAugust 24, 2021
NCA protects 1m victims from cyber crime attacksAugust 20, 2021
On the Go: Mobile Learning Solutions for IT TeamsAugust 18, 2021
Endpoint Resilience Report | Education Edition 2020/21August 15, 2021
How to improve COVID-19 supply chain cybersecurityJuly 21, 2021
FirstNet Enhances Public Safety Situational Awareness, Interoperability and Security CapabilitiesJuly 21, 2021
Zero Trust, We MustJuly 12, 2021
The Top 100 Software Companies of 2021June 26, 2021
7 keys to evaluating zero trust security frameworksJune 8, 2021
3 Ways to Support Understaffed IT DepartmentsJune 6, 2021
Absolute appoints Matt Schoenfeld as CROMay 17, 2021
Absolute Software Acquires NetMotionApril 19, 2021
How to Keep Kids Safe While Distance LearningApril 7, 2021
Absolute Software Enables Customers to Identify and Address Potential Endpoint Security RisksMarch 31, 2021
The Often-Overlooked Element of a Hack: EndpointsMarch 4, 2021
How 3 CEOs Turned Their Vision Into a Public CompanyMarch 3, 2021
The Different Flavors of Cyber ResilienceJanuary 21, 2021
Absolute’s customers can now self-heal critical apps to secure their distributed workforcesJanuary 13, 2021
TradeTalks: Cybersecurity measures needed to protect companies critical to the COVID vaccinationJanuary 11, 2021
Tools and standards shaping remote work in 2021January 7, 2021
Schools Strengthen Defenses Amid Increases in CyberattacksJanuary 5, 2021
In 2021, what kind of CIO are companies searching for?2020
December 14, 2020
5 questions every IT team should be able to answerDecember 9, 2020
Vaccine distribution pipeline faces serious cybersecurity risksDecember 2, 2020
Experts On Homebase CEO ScamNovember 24, 2020
New CEO of the Year: Christy Wyatt’s focus on customers turned Absolute Software’s fortunes aroundNovember 23, 2020
MPs subjected to over 22 million malicious email attacks in 2020November 23, 2020
UK Parliament hit with 3 million email attacks every monthNovember 16, 2020
How ITOps Can Adapt to the New NormalNovember 12, 2020
UK university targeted by one million malicious email attacksOctober 31, 2020
Closing Healthcare's Cybersecurity Gaps With Endpoint SecurityOctober 27, 2020
What Is Distance Learning’s Impact on Educational IT?October 15, 2020
Absolute Software Rolls Out Enhanced Global Partner ProgramOctober 5, 2020
Surge in ransomware attacks threatens student dataSeptember 30, 2020
How One School District Secured Its Distance Learning ModelSeptember 23, 2020
Experts discuss ways IT can maximize budget amid COVID-19 shrinkageSeptember 21, 2020
Cyber attacks on schools increasing amid remote learning shiftSeptember 18, 2020
Patching in the Time of Remote WorkSeptember 18, 2020
4 ways to keep your school resilient during distance learning 2.0September 16, 2020
Education's Urgent Need For Better Endpoint SecurityAugust 11, 2020
The burdens of remote workAugust 5, 2020
Top 100 Women in Cybersecurity for 2020July 9, 2020
HSBC customers targeted in new smishing scamJuly 8, 2020
London Councils dish out more than 7,000 mobile devices to support remote working amid COVID-19June 25, 2020
Why Cybersecurity Is Really A Business ProblemJune 25, 2020
New report highlights vulnerability of endpoint devices as result of so many people working from homeMay 20, 2020
Government departments bought hundreds of Zoom licences despite security fears over video meeting appMay 19, 2020
EasyJet hit with massive cyber attackMay 6, 2020
Absolute enables customers to self-heal even more of their mission-critical security controlsMay 6, 2020
Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patchingMay 6, 2020
HMRC takes down nearly 300 Covid-19 phishing scam sites since March (National Cyber Security News)April 30, 2020
Morning Cybersecurity: Absolutely ScattershotApril 16, 2020
Free Security Resources and Services for COVID-19March 31, 2020
Universities being hit by millions of cyberattacksMarch 23, 2020
Pitfalls to Avoid in the COVID-19 Rush to Work from HomeMarch 23, 2020
COVID-19: Essentials for Business Continuity NowMarch 16, 2020
Rail Thieves Prosper as Mobile Device Thefts Jump 62%March 15, 2020
How Absolute Protects Patient Data At Apria HealthcareMarch 12, 2020
Absolute ensures remote workers have secure access to critical business apps and informationMarch 11, 2020
Absolute Helps Customers Secure Remote Workforces At No Charge In Response To Coronavirus OutbreakMarch 11, 2020
This company wants to heal and repair your VPNMarch 8, 2020
Five Interesting Takeaways From RSA Conference 2020February 19, 2020
10 Hot Cybersecurity Companies To Follow In March 2020January 31, 2020
UK Cyber Sector Tops £8bn as Brexit LoomsJanuary 29, 2020
Absolute 2020 Predictions: New Year, New Cybersecurity GoalsJanuary 26, 2020
Top 10 Cybsersecurity Companies to Watch in 2020January 20, 2020
Apria Healthcare leverages Absolute to protect patient data and ensure HIPAA complianceJanuary 20, 2020
London Councils Lose Nearly 1300 Devices Over Three YearsJanuary 8, 2020
Dianne Lapierre joins Absolute as Chief Information Officer2019
December 27, 2019
It's Time To Make Enterprise Resilience A RealityDecember 23, 2019
UK police lose millions of smart devicesDecember 20, 2019
CCPA: What Does It Mean For AI (Artificial Intelligence)?December 10, 2019
Why Cybersecurity Needs To Focus More On Customer Endpoints (Enterprise Irregulars)December 5, 2019
How Boards Can Boost Their Cyber IQNovember 24, 2019
10 Predictions How AI Will Improve Cybersecurity In 2020 (Forbes)November 20, 2019
Achieving Enterprise Resiliency Requires A Cyber-Committed BoardNovember 18, 2019
Schools Under Cyber Siege Need a Path to ResilienceOctober 28, 2019
The Top 50 Women Leaders in SaaS in 2019October 23, 2019
The Cybersecurity Threats That Keep K–12 CIOs Up at NightOctober 22, 2019
HIPAA Compliance Tips & Best PracticesOctober 20, 2019
5 Strategies Healthcare Providers Are Using to Secure NetworksOctober 11, 2019
CEOx1Day: Pulling Back the Curtain on the C-SuiteOctober 10, 2019
Report: Schools One of the Biggest Targets for RansomwareOctober 3, 2019
Ed tech’s growth breeds district IT ‘management nightmare’October 1, 2019
HMRC Disciplines 100 Staff for IT Misuse (IT Security News)October 1, 2019
HMRC disciplines 100 staff for IT misuse (The Register)October 1, 2019
It’s Time to Solve K-12’s Cybersecurity CrisisSeptember 17, 2019
540 mobiles, laptops and tablet computers lost by Defra and EA in last three yearsSeptember 16, 2019
UK’s Environmental Agencies Lose Hundreds of DevicesSeptember 16, 2019
#privacy: UK’s environmental agencies have misplaced 540 devicesSeptember 13, 2019
Three Ways to Bolster Endpoint Resilience in the Face of RansomwareSeptember 10, 2019
Three Ways to Refine Your Enterprise Endpoint Security StrategySeptember 4, 2019
CPS in the docks over 100 'serious' data breachesSeptember 4, 2019
CPS Under Fire After Rise in Data LeaksAugust 23, 2019
Absolute's CEO Christy Wyatt On Leading a Cybersecurity Company and the Power of ResilienceJuly 30, 2019
MoD and Data Losses Soar 300%July 29, 2019
Unauthorised Disclosures Up Five Fold at the Ministry of Defence, While Device Losses TripleJuly 26, 2019
Absolute Enhances its Enterprise Resilience EditionJuly 15, 2019
Where Businesses Waste Endpoint Security BudgetsJuly 14, 2019
Why AI is the Future of CybersecurityJune 25, 2019
Ransomware: Why Every Org is a BullseyeJune 19, 2019
After the Final Round: Christy WyattJune 16, 2019
Top 10 Cybersecurity Companies To Watch In 2019June 10, 2019
6 ways malware can bypass endpoint protectionJune 6, 2019
Is This the End for Your Endpoint Security Tool?June 5, 2019
Daily briefingApril 29, 2019
The Key to Stronger Enterprise Endpoint Security TodayApril 18, 2019
All endpoint security tools eventually failApril 18, 2019
MSSP News: 18 April 2019April 18, 2019
More Security Endpoint Tech Isn't Always BetterApril 17, 2019
Daily briefing, April 17, 2019April 15, 2019
Podcast: Josh MayfieldMarch 5, 2019
Endpoints, The Law of Entropy and Evading ChaosFebruary 12, 2019
Security wellness takes more than a fad dietFebruary 8, 2019
2019 Security Predictions and Directions2018
December 26, 2018
Secret CSO: Chris Covell, AbsoluteDecember 17, 2018
New Focus on Data Privacy Directs Compliance Trends in 2018December 13, 2018
ISSUE 60 (December, 2018) Building strategiesNovember 12, 2018
7 ways to get buy-in for your next IT Ops projectNovember 1, 2018
How Security Can Enable Digital Transformation