LOLBAS leverage legitimate binaries and scripts for malicious purposes making them hard to catch. They also happen to be one of the growing trends in cybersecurity attacks...
Zero Trust has evolved from buzzword to mandate for organizations of all types and sizes. With a Zero Trust approach to cybersecurity, businesses can better defend against...
Penetration testing remains the cornerstone of preventative, compliant, cost-effective cybersecurity…but not all penetration testing providers are created equal. ...
Lulu's Gift Company, an independent retail business, needed help with their plans to enter the B2B gift market. Collaborating with the LuLu team, Absolute delivered a site...
Discover the resources required to install Red Hat Openshift as a public cluster on the AWS Public cloud infrastructure as well as resources required to deploy Quay and...
Read the white paper, "Five Areas to Secure Containers in the Cloud," for a deep dive into a robust container security strategy that will bring cloud technology...