Posts by Josh Mayfield

Josh Mayfield
Josh is Absolute’s Director of Security Strategy and works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications including, SC Magazine, Infosec, and Dark Reading, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
NIST Cybersecurity Framework: Second, Build a Moat
Josh Mayfield
NIST Cybersecurity Framework: Second, Build a Moat

My last post guided you through the first pillar of the NIST Cybersecurity Framework (CSF): Identify. Here, we’ll talk through the steps to fulfill the second pillar of NIST CSF: Protect. But first, let’s consider a small, subtle nuance in our language. “Safe” is an adjective, not a verb. Although everyone wants to describe their data, devices, apps, and users as safe, the label is only true when a...

READ MORE
NIST Cybersecurity Framework: First, See Everything
Josh Mayfield
NIST Cybersecurity Framework: First, See Everything

A long time ago in an organization far, far away… we had straightforward cybersecurity. There were relatively few assets, they were static and they accessed data through firewalls to prevent unauthorized access to a consolidated, authoritative data source: the network. Oh, and ‘apps’ weren’t a thing yet. We called them ‘programs’ or ‘applications’ and they were large, on-premises, and relatively homogenous. After all, if each business unit had their...

READ MORE
The Complexity Gap
Josh Mayfield
The Complexity Gap

Enterprise Strategy Group (ESG) has been one of several organizations tracking the cybersecurity skills shortage and they have been sounding an alarm for many years. While a few tactical programs have attempted to address this shortfall, ESG views them more as lip service rather than a real solution. Alarmingly, the situation appears to be getting much worse—so much so that ESG and others now believe that the growing cybersecurity...

READ MORE
How to Use the NIST Cybersecurity Framework
Josh Mayfield
How to Use the NIST Cybersecurity Framework

The threat landscape has evolved, the attack surface has mutated, and everywhere you look the cybersecurity skills shortage leaves more to do than there are people to do it. One way to push back on these pressures is to adopt a cybersecurity framework (CSF). There are two clear benefits for security teams using CSFs: Security disciplines are formalized. Cybersecurity teams have a wealth of knowledge and they are capable...

READ MORE
KCOM Ensures GDPR Compliance & Strengthens Security Posture: Case Study
Josh Mayfield
KCOM Ensures GDPR Compliance & Strengthens Security Posture: Case Study

KCOM is a leading provider of IT and communication services to enterprises and public-sector organizations in the UK, helping clients integrate and leverage emerging technologies. With over 2,000 employees working across nine locations, remotely, and in the field, KCOM turned to Absolute to provide a scalable solution that would allow them to take a proactive stance against endpoint threats. Raising the Bar on Security As experts in leading-edge technology solutions,...

READ MORE