Political Activists: A Powerful Insider Threat
Richard Henderson
Political Activists: A Powerful Insider Threat

A single person inside your organization holds the power to disrupt and cause costly damage. Up to 43% of all breaches are the result of insiders either inadvertently or maliciously putting data at risk, but it’s these privileged insiders that hold the necessary credentials and access to cause significant reputational damage. By far, the most nefarious of these insiders is the malicious insider with a strong moral, religious or political...

READ MORE
Absolute 7 Platform Extends Emerging Threat Response Capabilities
Kim Ellery
Absolute 7 Platform Extends Emerging Threat Response Capabilities

Building on the momentum of Absolute 7, our next-generation enterprise security platform featuring Reach technology, we’ve expanded our extensive query and remediation capabilities to give IT and security professionals more ways to tackle the changing risk landscape. With the latest enhancements to the  Absolute platform, organizations can address the growing need for enhanced vulnerability management, help drive enhanced endpoint security hygiene and more efficiently remediate emerging threats. The Absolute platform empowers IT...

READ MORE
Do You Have a Dark Endpoint Problem?
Richard Henderson
Do You Have a Dark Endpoint Problem?

Endpoint blind spots are large – and growing. According to the recent Cost of Insecure Endpoints study by Ponemon, 53% reported malware infected endpoints had increased in volume in the past 12 months alone and 63% said they could not monitor company endpoints once they left the corporate network. More attacks and less visibility is a recipe for disaster of course: it puts your data at great risk and...

READ MORE