Profile

Cover photo
1,001 followers|158,707 views
AboutPostsYouTube

Stream

Absolute

Shared publicly  - 
 
People have always been the weakest link in data security. http://bit.ly/1nQv5qB
It’s now recognized that people are the root cause of most data breaches, as many as 90% of all breaches, either inadvertently or maliciously putting data at risk. The expansion of the attack surface through mobility, the cloud and even the Internet of Things has just increased the number of ways that “people” can put data at risk. These breaches are, in many ways, preventable, but the first step in stemming the breaches in understanding why they...
1
Add a comment...

Absolute

Shared publicly  - 
 
Our most provocative education theft investigations of 2015. http://bit.ly/1KD9FXR
Absolute has helped recover more than 38,000 devices from 112 countries, thanks to our technology and the support of our Absolute Investigations team. In 2015 alone, we conducted more than 5,700 theft investigations. Aside from helping to solve thousands of cases, our theft recoveries can have a meaningful impact on a case-by-case basis. In education, for example, the theft of a device can greatly impact the educational outcomes of students and c...
2
Add a comment...

Absolute

Shared publicly  - 
 
As home to valuable intellectual property and research, universities are a growing target for cyber criminals. http://bit.ly/1nQnfgx
Thomas Duffy, chair of the Multi-State Information Sharing and Analysis Center, which is the focal point for cyber threat prevention, protection, response and recovery for various government levels in the US, recently sat down with FedScoop about the evolving threat landscape in the public sector.
1
Add a comment...

Absolute

Shared publicly  - 
 
Overconfidence can lead to complacency in security preparedness. http://bit.ly/1QIGNyr
In 2015, we saw more data breaches and larger data breaches than ever before with almost half of all organizations suffering at least one serious security incident / data breach in the past 12 months. IDC predicts that by 2020, more than 1.5 billion people, or a quarter of the world’s population, will be affected by data breaches. Given this state of affairs, one would assume that organizations would be wary to call themselves prepared.
1
Add a comment...

Absolute

Shared publicly  - 
 
There's even more pressure now on financial institutions to prove that policies, procedures and technologies are in place to protect data. http://bit.ly/1nS9cGW
Financial services organizations have been facing an increased level of scrutiny in regards to data security. In 2015, both the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) announced a stronger commitment to data protection, including tighter regulations and enforcements, putting added pressure on financial institutions to prove that policies, procedures and technologies are in place to protect ...
1
Add a comment...

Absolute

Shared publicly  - 
 
We've released ‪#‎AbsoluteDDS‬ 5.26, which includes enhanced #SIEM integration. Learn more: http://bit.ly/1SMGfZB
1
Add a comment...
Have them in circles
1,001 people
Tactical Sales Training Limited's profile photo
Valentina Georgieva's profile photo
Michael Malfatti's profile photo
cristian mihalache's profile photo
Raphael Alves Augusto's profile photo
Software im Unternehmen's profile photo
Juniho Unusi's profile photo
Rodolfo Torres's profile photo
Craig Wilson's profile photo

Absolute

Shared publicly  - 
 
The truth is, encryption is good, but it’s not good enough. Here's why. http://bit.ly/1PXxa02
Even though 2015 saw more data breaches than ever before, with cybercrime as the biggest cause of many of those breaches, the truth behind that statement is actually more complex. The growth of mobile device usage, and the use of the cloud, have expanded the attack surface exponentially, introducing more ways for cybercriminals to find a way back to the network. Right now, as many as 36% of cyber security incidents can be tied back to attacks on ...
2
1
Darryl Gambrell's profile photo
Add a comment...

Absolute

Shared publicly  - 
 
Educational institutions have a responsibility to build out effective data governance frameworks. http://bit.ly/1PXuFL4
Data governance is important in any organization, but organizations that protect the information of minors have a more critical role. Educational institutions have a responsibility to build out effective data governance frameworks, and to report to parents on how student data is being protected and used. Not only is this important for the privacy of the minors in question, but also because identity theft for children is both difficult to spot and...
2
Add a comment...

Absolute

Shared publicly  - 
 
As digital data has evolved to effortlessly cross geographic boundaries, new legal solutions have emerged. http://bit.ly/1PAzHew
2
Add a comment...

Absolute

Shared publicly  - 
 
This is the largest cybersecurity report to-date that focuses on the opinions of in-house counsel. http://bit.ly/1QIBFdw
The Association of Corporate Counsel (ACC) recently released its State of Cybersecurity Report giving a legal insider perspective to the current cybersecurity practices, prevention, protection and response standings at more than 800 organizations across 30 countries.
1
Add a comment...

Absolute

Shared publicly  - 
 
BYOD has come with more challenges to the K-12 classroom than anticipated, and won't get easier any time soon. http://bit.ly/1Seyw74
It was estimated that 20% of K-12 classrooms would have integrated BYOD programs by the end of 2015, with the promise of being able to deliver on digital curriculum without the capital expense of 1:1 programs. Unfortunately, BYOD has come with more challenges to the K-12 classroom than anticipated.
1
Add a comment...

Absolute

Shared publicly  - 
 
There has been a great deal of criticism for the long-awaited legislation and its potential value. http://bit.ly/1nBsCzO
After several years of discussion, the Cybersecurity Act of 2015 was signed into law as part of the 2016 omnibus spending bill. The Cybersecurity Act of 2015 encourages sharing of cyber threat information between private businesses and the federal government. In addition to the sharing of threat information, the Act will require the federal government to release periodic cybersecurity best practices.
4
Add a comment...
People
Have them in circles
1,001 people
Tactical Sales Training Limited's profile photo
Valentina Georgieva's profile photo
Michael Malfatti's profile photo
cristian mihalache's profile photo
Raphael Alves Augusto's profile photo
Software im Unternehmen's profile photo
Juniho Unusi's profile photo
Rodolfo Torres's profile photo
Craig Wilson's profile photo
Contact Information
Contact info
Phone
1-888-999-9857
Story
Tagline
Confident to the core.
Introduction

Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones. Our customers depend on us to provide them with a unique and trusted layer of security so they can manage mobility while remaining firmly in control.