What China’s New Cybersecurity Law Means for You

What China’s New Cybersecurity Law Means for You

The Chinese government has just passed a cybersecurity law that has broad implications for international businesses. The move comes with great criticism, with some calling the law “draconian” and “abusive” while others note the law is “vague” enough to spark worries of “censorship and espionage.” The legislation was […]

New Device Usage Reports and Security Dashboards

New Device Usage Reports and Security Dashboards

Absolute Data & Device Security (DDS) November 2016 release introduces exciting new capabilities to monitor device usage, maximize device utilization, and gain a deeper level of visibility across your entire device population. As part of the new release, we’ve also launched a new Security Dashboard to give you […]

Absolute Working to Improve Data Security in Colombia

Absolute Working to Improve Data Security in Colombia

Data security is a priority for organizations and government agencies the world over. Absolute’s Chief Product Office Christopher Bolin and our Sales Director Jorge Hurtado recently flew out to Colombia to take part in Andicom 2016. While there, they sat down with Finance Colombia’s Executive Editor Loren Moss […]

Is Your Data Breach Response Plan Effective?

Is Your Data Breach Response Plan Effective?

We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if […]

New Approaches Needed to Address Cloud Security

New Approaches Needed to Address Cloud Security

The shift to the cloud has significantly increased the risks to data security, although the cloud itself is not necessarily to blame. As has been demonstrated, many cloud purchases are made outside the control or oversight of IT, creating a dangerous Shadow IT environment that, when left unmanaged, […]

Webinar: Remembering the User in your Layered Security Model

Webinar: Remembering the User in your Layered Security Model

Security professionals have been proselytizing the benefits of layered security or defense-in-depth for a long time. The more layers you build in your security model, the more likely it will be that one (or some) of your defenses will detect anomalous or malicious behavior before it does any […]

Security in the Cloud Requires Visibility

Security in the Cloud Requires Visibility

There is a rapid enterprise movement toward the cloud, and yet such movement has remained uncoordinated. Gartner estimates that less than one-third of enterprises have a documented cloud strategy. This has led to an explosive growth in Shadow IT and Shadow data as well as application development that […]

FTC Asserts Independent Authority Over HIPAA-Covered Entities

FTC Asserts Independent Authority Over HIPAA-Covered Entities

The Federal Trade Commission (FTC) and the Office for Civil Rights (OCR) have jointly released a guide on the importance of complying with both HIPAA and the FTC Act. The guide reminds healthcare organizations to comply with both regulations as investigations or fines for non-compliance are assessed independently […]