Featured

Detecting Insider Threats: The Importance of Context
Detecting Insider Threats: The Importance of Context

The SANS Institute released a report earlier this year on Insider Threats and the Need for Fast and Directed Response. The report talks about the importance of recognizing insider threats, whether accidental or intentional, why they occur and their implications, which often are more dire than external attacks alone.

READ MORE
Fear Drives Irrational Security Responses
Fear Drives Irrational Security Responses

Roger A. Grimes recently wrote an excellent opinion piece for InfoWorld on how fear-driven responses lead to misaligned security preparedness. The No. 1 problem with computer security addresses the need for a data-driven security plan, one that focuses on real security threat information and not what is sensationalized in the news. In the beginning of his article, Roger talks about how many organizations feel they are doing a lot to...

READ MORE
Create a Layered Approach to Security with Absolute and Dell
Create a Layered Approach to Security with Absolute and Dell

Today it’s all about the data. With the complexity of cross-platform environments and sophisticated cyber criminals, organizations need to apply a layered approach to security so they can protect their data and prove compliance. A key component of endpoint security is accurate reporting, and for Dell customers that can be achieved more easily thanks to Dell’s long-standing partnership with Absolute.

READ MORE
Persistent Weaknesses Found at Government Agencies
Persistent Weaknesses Found at Government Agencies

The Government Accountability Office (GAO) just released a report indicating that weaknesses in security programs persist across many federal agencies. The Federal Information Security Report found persistent weaknesses at all 24 federal agencies examined. These weaknesses were consistent with the findings in 2013, showing very little improvement in data protection, which is worrying given the increase in risks year-by-year.

READ MORE
Absolute DDS Complements and Strengthens SCCM
Absolute DDS Complements and Strengthens SCCM

At Absolute, we are always listening to our customers and gathering feedback on the challenges they face within their IT environments. Many of our customers have reported that Microsoft SCCM is an important component within their IT security and management stack.

READ MORE