Absolute
Tackling the insider threat: Where to start?
Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of …
Let no endpoint go dark
The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …
Most network endpoints are in the dark: Do you know how to find them?
Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …
New infosec products of the week: August 11, 2017
Forensically sound extraction of public domain social media data Cellebrite has introduced a new UFED Cloud Analyzer solution that provides forensically sound, real-time …
Poor endpoint security can cost you millions in detection, response, and wasted time
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …
New infosec products of the week: June 9, 2017
Absolute expands its self-healing endpoint security and compliance solutions for Android devices Absolute expands its support for Android to provide uncompromised visibility …
Enable self-healing endpoint security with Application Persistence
In this podcast recorded at RSA Conference 2017, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, SVP of Product Development at Absolute …
Photos: RSA Conference 2017 Expo, part 2
RSA Conference 2017 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: Dome9 Security, Bitglass, Qualys, Easy …
Self-healing endpoint security as a foundation for visibility
When it comes to persistent cyber threats, a majority of companies have resigned themselves to the fact they will be or are already infiltrated by an unknown adversary. It is …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul