It’s become a vicious cycle. Budgets grow, tools are purchased, and IT workloads expand. But in the end, IT teams are still forced to scramble and mega data breaches continue. What is going on?Read More
Josh is Absolute’s Director of Security Strategy and works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications including, SC Magazine, Infosec, and Dark Reading, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
Author: Josh Mayfield
The Zero Trust security model establishes the idea that an enterprise cannot automatically trust any endpoint originating inside or outside of its perimeters. There is an authentication that happens at every single turn. Ideally, businesses should verify anything and anyone attempting to connect to their systems before granting access.Read More
Billions of people were affected by data breaches in 2018. Now is the time when, if we’re paying attention, we can learn a lot from last year’s barrage of cybersecurity threats. A breakdown of the top cybersecurity threats from 2018 won’t make us immune from attack in the future, but it can help us hone our defenses for the upcoming year.Read More
It isn’t rocket science — consumers want to do business with companies they trust. As the world becomes increasingly dematerialized and people take a greater interest in their digital selves, the foundations for strong data privacy is now of utmost importance for everyone.Read More