Securing Security at Black Hat 2016 with Absolute Persistence

Securing Security at Black Hat 2016 with Absolute Persistence

Security researchers, technology engineers, and executives from Absolute, including CTO Christopher Bolin, will be attending Black Hat in Vegas August 2-4 to unveil their answers to securing the security landscape.

How Could Brexit Impact Your Organization’s Data Security?

How Could Brexit Impact Your Organization’s Data Security?

There is no question that countries and organizations around the world will be dealing with the fallout from Brexit for years to come. For organizations in the US, the real question is what will be the specific impact in the near future?

First Business Associate HIPAA Penalty Announced

First Business Associate HIPAA Penalty Announced

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced its first resolution agreement with a business associate in June.

The Download: This Week’s Top Security News

The Download: This Week’s Top Security News

This week we cover a telecom operator data breach, malware in Pokémon Go, and a new security feature in Facebook Messenger.

Get a Point-in-Time Assessment of Your Endpoint Security

Get a Point-in-Time Assessment of Your Endpoint Security

Leverage critical insight about existing threats and security vulnerabilities for devices on and off your corporate network.

Don’t Let the Media Influence Your Data Security Planning

Don’t Let the Media Influence Your Data Security Planning

There is a huge disconnect between corporate confidence in security preparedness and the number of actual security incidents that occur each year.

New Report Pins Down the Insider Threat in Healthcare

New Report Pins Down the Insider Threat in Healthcare

In order to understand how to better protect healthcare data, it’s important to understand just why healthcare employees are bypassing security protocols.

Map Your Network to Boost Your Data Security

Map Your Network to Boost Your Data Security

Healthcare organizations are one of the most challenging data security environments to protect. With often limited IT resources, these organizations need better ways to allocate resources in order to meet these threats.