
It’s Time To Solve K-12’s Cybersecurity Crisis
There were a record 160 publicly-disclosed security incidents in K-12 during the summer months of 2019, exceeding the total number of incidents reported in all of 2018 by 30%. 47% of K-12 organizations are making cybersecurity their primary investment, yet 74% do not use encryption. 93% of K-12 organizations rely on native client/patch management tools […]

5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
Endpoint security tools are 24% of all IT security spending, and by 2020 global IT security spending will reach $128B according to Morgan Stanley Research. 70% of all breaches still originate at endpoints, despite the increased IT spending on this threat surface, according to IDC. To better understand the challenges organizations have securing the proliferating number and […]

Absolute’s CEO Christy Wyatt On Leading A Cybersecurity Company And The Power Of Resilience
Christy Wyatt’s career exemplifies what you would expect from a high-performing tech leader who thrives on turning challenges into growth. Showing persistence, resiliency, and tenacity – she has a long history of scaling high-growth technology companies and infusing them with greater creative energy, ingenuity, and intensity for results. As CEO of Absolute, she’s leading the company […]

How To Secure Mobile Devices In A Zero Trust World
86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types. 48% say they’ve sacrificed security to “get the job done” up from 32% last year. 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were […]

74% Of Data Breaches Start With Privileged Credential Abuse
Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s […]

58% Of All Healthcare Breaches Are Initiated By Insiders
58% of healthcare systems breach attempts involve inside actors, which makes this the leading industry for insider threats today. Ransomware leads all malicious code categories, responsible for 70% of breach attempt incidents. Stealing laptops from medical professionals’ cars to obtain privileged access credentials to gain access and install malware on healthcare networks, exfiltrate valuable data […]

Some Non-Predictions for 2015
It’s that time of new year when you get deluged with analysts / bloggers predictions and prognostications. I join in most years, and of course there’s the IDC predictions process to contend with as well. This year I swore that I was skipping it. I’ve already done the new IDC “Futurescape” document and webcast with my […]

Technology for Good – episode thirty four with Salesforce’s John Tascheck
Welcome to episode thirty four of the Technology for Good hangout. In this week’s episode our guest was SalesForce SVP of Strategy, John Taschek. John and I are both longtime members of the Enterprise Irregulars, but this was the first time John and I had had a conversation outside of email! Some of the more […]