Do You Know Where Your Endpoints Are? Security, risk and IT professionals are dealing with staggering amounts of endpoint-related data loss and exposure. The proliferation of mobile devices, the Cloud and the decentralization of IT / Shadow IT and IoT all amplify the chance that an endpoint will be the source of a data breach. One estimate suggests that, by 2020, the amount of data stored on devices will...
READ MOREThat awesome tweet pretty much summed up an engaging panel discussion on privacy and security concerns related to the Internet of Things (IoT), held last night in Vancouver. Absolute’s own Richard Henderson, Global Security Strategist, was among the “ninjas” at the event, hosted by the Vancouver Entrepreneurs Forum and Ready Room Briefings. Other panelists included Adam Shostack, Founder of Confidenza Security, Eric Winsborrow, CEO of Distrix Networks, Ryan Wilson, CTO...
READ MOREThe emergence of Advanced Persistent Threats (APTs), zero-day vulnerability exploits, and the ever-present threat posed by arguably the most dangerous of adversaries, the organization’s own users, continue to poke new holes in even the most well-laid security architectures. While the tools that attempt to keep data and other assets safe are doing their best to keep pace, malicious software, and the people behind it, continue to find ways to...
READ MORE