Quantcast
Channel: Featured – InTelligence Blog
Browsing all 14 articles
Browse latest View live

Absolute DDS Complements and Strengthens SCCM

At Absolute, we are always listening to our customers and gathering feedback on the challenges they face within their IT environments. Many of our customers have reported that Microsoft SCCM is an...

View Article



Persistent Weaknesses Found at Government Agencies

The Government Accountability Office (GAO) just released a report indicating that weaknesses in security programs persist across many federal agencies. The Federal Information Security Report found...

View Article

Create a Layered Approach to Security with Absolute and Dell Data Protection...

Today it’s all about the data. With the complexity of cross-platform environments and sophisticated cyber criminals, organizations need to apply a layered approach to security so they can protect their...

View Article

Fear Drives Irrational Security Responses

Roger A. Grimes recently wrote an excellent opinion piece for InfoWorld on how fear-driven responses lead to misaligned security preparedness. The No. 1 problem with computer security addresses the...

View Article

Detecting Insider Threats: The Importance of Context

The SANS Institute released a report earlier this year on Insider Threats and the Need for Fast and Directed Response. The report talks about the importance of recognizing insider threats, whether...

View Article


How to Get Support for Absolute DDS

We try to make it as easy as possible, with support online, by phone or directly from within Absolute DDS, so we can quickly help you solve your problem. We’re here to help. Click through to find out...

View Article

Organizations Mistakenly Believe Their Endpoints Are Secure

In 2015, we saw more data breaches and larger data breaches than ever before with almost half of all organizations suffering at least one serious security incident / data breach in the past 12 months....

View Article

Encryption Not Keeping Pace with Mobile Workforce

Even though 2015 saw more data breaches than ever before, with cybercrime as the biggest cause of many of those breaches, the truth behind that statement is actually more complex. The growth of mobile...

View Article


Why Small Mistakes are a Big Deal: Dealing with the Insider Threat

It’s now recognized that people are the root cause of most data breaches, as many as 90% of all breaches, either inadvertently or maliciously putting data at risk. The expansion of the attack surface...

View Article


The Network Perimeter is in Your Pocket

HPE’s Cyber Risk Report 2016 details the evolving threat landscape, including a growing number of threats on endpoint devices. According to the report, though threats continue to evolve, it’s not...

View Article

Absolute Vancouver Headquarters: Why We’re Upgrading

What happens when a growing tech company starts to run out of office space in Vancouver? We get creative. For the first time in the history of Absolute, we are creating a purpose-built office space...

View Article

How to Create a Data Security and Control Framework

Data is the lifeblood of today’s digital businesses. Protecting corporate data from theft, misuse, and abuse is the top responsibility of every Security and Risk (S&R) leader, notes Forrester's...

View Article

IT Security: Winning When You Fail

The best IT security stories are the war stories. Tales from the front line where hackers patiently wait for the perfect shot and oblivious employees gently toss hand grenades over the firewall without...

View Article


Top 3 Apps that Matter Most to IT

Of all the applications you deploy to your endpoints, which ones matter most? It’s an interesting question, especially when you consider the many risks you face when it comes to securing your endpoints...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images