The Security Insider Community. Powered by Absolute.

Absolute’s online community encompasses the Security Insider blog and Absolute’s social media communities on Twitter, LinkedIn, Facebook and YouTube. Together, these channels encompass a forum to discuss industry trends, get thought leadership about data and device security, learn about new Absolute products, and connect with industry professionals.

The Security Insider blog is an information security news source, covering a range of industry topics like data risk management, mobility trends, data breaches and threat detection across verticals that include enterprise, healthcare, education, government and the financial sector.

Absolute Security Insider Contributors

Our diverse and talented team of editorial contributors is well-versed in information technology, data & device security, endpoint security, current trends and reports, and industry thought leadership. Contact us with your ideas and feedback.

User Guidelines & Comment Policy

Our goal is education, connection, and communication. We appreciate your comments and welcome the increased interaction on our community sites and social media channels. Please keep our user guidelines in mind as you connect with us. This comment policy provides transparent oversight in terms of how comments appear on these sites. We reserve the right to moderate or remove any comments, as well as limit access for users who repeatedly abuse the commenting policy. Everyone must comply with the Terms and Conditions of the platform provider as well as the following guidelines:

  • Keep it clean: Use appropriate language and etiquette. Comments that include offensive or inappropriate language will be deleted.
  • Keep it courteous: Healthy debate is encouraged but personal attacks will not be tolerated.
  • Keep it on-topic: Any comment that is not relevant to the topic at hand will be deleted.
  • Keep it legal: Any comment relating to legal or financial matters will be deleted. Do not post information that is known to be false, fraudulent, deceptive, inaccurate or misleading.
  • Keep personal info private: This page is public. For your own safety, do not post any personal information about yourself or third parties (e.g. addresses, phone numbers, or email addresses).
  • Keep it spam-free: Any comment deemed to be spam will be deleted including posts that overtly promote products, services or external links. Comments from that same user that are repeated or similar in nature will be deleted.

Comments or opinions expressed on this page are those of their respective contributors only. The views expressed on this page do not necessarily represent or reflect the views of Absolute, its management or employees. Absolute is not responsible for, and disclaims any and all liability to the fullest extent permitted by law for, the content of comments written by contributors to this page. We moderate all comments and check for new comments on a regular basis. If you think you posted a comment that has not appeared, contact us.

How do I join the Security Insider community?

Subscribe to our email list so that you’re getting the latest blog news and updates sent to your inbox. We invite you to leave comments, and ask questions. You can also connect with us on Twitter.

Register for the Security Insider Forum: Just sign up with your email address, and create a unique username. You can choose what kind of content you want to see by subscribing to individual sub-forums and threads.

About Absolute

Absolute: The Self-Healing Endpoint Security Company

Uncompromised Visibility and Real-time Remediation of Security Breaches

Absolute’s self-healing endpoint security platform delivers uncompromised visibility and real-time remediation of breaches at the source. Our cloud-based platform puts IT and security professionals in absolute control of devices, data and applications — whether on or off the network — to enhance IT asset management, protect sensitive data, reduce insider threats, and ensure compliance. Only Absolute can offer the ability to self-heal because of our two-way connection to Absolute Persistence technology, which is already embedded in more than 1 billion popular endpoint devices. For more information, visit