Seeking Clarity for IoT

Seeking Clarity for IoT

When it comes to IT acronyms and technical jargon fly fast and free. We’re always looking for a new way to name things, it seems. Shadow IT. Shadow Data. IoT. Shadow IoT. Security of Things. The desire for clarity through naming conventions can overshadow the message. When it comes […]

Breaches in Education Sector Up 40%

Breaches in Education Sector Up 40%

With 2016 nearly behind us already, we’re starting to see some patterns in data breach trends that are rather concerning. One such pattern has been the consistent increase in data breaches affecting the education sector, up 39.6% over the same time period in 2015. The education sector has […]

Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation

Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation

Security is not a black and white matter: there are vast shades of grey that exist in even the most well-thought out security architectures. APTs, zero-days, exploits, vulnerabilities, IoT threats, and the ever-present threat from an organization’s own users, all pose significant amounts of risk to your assets […]

Decentralization of IT Tech Increases Security Risk

Decentralization of IT Tech Increases Security Risk

IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the […]

3 Benefits of Adopting Student Technology Analytics in Schools

3 Benefits of Adopting Student Technology Analytics in Schools

The use of technology in today’s classrooms has been transformative both from a teaching and student experience. Not only does early integration of technology help prepare students for the workplace of tomorrow, it is also adaptable to a wider variety of learning styles, encourages collaboration, and increases student […]

Security Posture Dashboards in Absolute DDS: A Deeper Look

Security Posture Dashboards in Absolute DDS: A Deeper Look

As part of the November 2016 release of Absolute Data & Device Security (DDS), we released new Security Posture Reports and a convenient Security Dashboard. With instant access to the health status of critical security layers and aggregate assessments of your entire security stack, you can take firm control of your security […]

Security is Top Business Goal in Healthcare

Security is Top Business Goal in Healthcare

The College of Healthcare Information Management Executives (CHIME) recently asked 100 CIOs about their perspectives on communications in healthcare, from business goals to technology changes to security. The survey revealed that strengthening data security is the top goal of 81% of healthcare organizations, ahead of increasing patient satisfaction […]

Webinar: Shining a Light on Endpoint Security Blind Spots

Webinar: Shining a Light on Endpoint Security Blind Spots

The perimeter-based model of protecting enterprise networks just isn’t working anymore: there are far too many ways into an infrastructure, and just as many ways out. It’s an uncomfortable reality that a sizeable number of risks are present today and came in through the back door. Add to […]