Enterprise

RSA 2017: Self-Healing Endpoint Technology Makes RSA Debut
RSA 2017: Self-Healing Endpoint Technology Makes RSA Debut

RSA Day 1 Keynotes: Control what you can, plan for chaos Absolute officially kicked off RSA today, with the team meeting many new faces and welcoming back familiar friends. Our opening party at Jillian’s was a great opportunity to introduce self-healing endpoint technology to RSA attendees, while Absolute’s own Phil Shomura talked about our technology to a packed house during a presentation at our booth (#S2427). Black Violin kicked off RSAC...

READ MORE
Forrester’s “Mastering the Endpoint” Webinar Now Available
Forrester’s “Mastering the Endpoint” Webinar Now Available

Chris Sherman, a senior analyst at Forrester Research, recently joined Nima Baiati, Absolute’s senior director, product management, for a webinar discussion on endpoint security best practices, In the Mastering Endpoint Security webinar, Chris looked at how current endpoint security strategies are failing against modern adversaries and how increased visibility — combined wth strong prevention, detection and orchestrated response — can help increase the effectiveness of endpoint security practices. Chris shared data about...

READ MORE
Arby’s Breach Underscores Endpoint Vulnerability
Arby’s Breach Underscores Endpoint Vulnerability

  The Arby’s Restaurants breach, announced today by security journalist Brian Krebs on the Krebs On Security blog, wasn’t huge in comparison to some of the massive card breaches like at Target and Home Depot in previous years, but the way it may have happened could be indicative of a larger issue. Corporate origin? In comparison to other credit card breaches where the number of stolen cards was in the...

READ MORE
EVENT: Forrester and Absolute Webinar Feb. 9th: Mastering Endpoint Security

Are Your Endpoints Secure? Security, risk and IT professionals are dealing with staggering amounts of endpoint-related data loss and exposure. The proliferation of mobile devices, the Cloud and the decentralization of IT/shadow IT and IoT all increase the chance that an endpoint will be the source of a data breach. One estimate suggests that, by 2020, the amount of data stored on devices will be 5 times higher than...

READ MORE
The Yahoo Breach Fallout Could Last for Years

On December 14, 2016, Yahoo posted a Security Notice announcing that over 1 billion Yahoo user accounts were breached in August, 2013. This data breach is separate, although possibly linked, to the September 22, 2016 state-sponsored breach that affected 500 million people. The repercussions of this data breach are wide-reaching and promise to be long-lasting. Yahoo announced that an unauthorized third party breached the data files of 1 billion...

READ MORE