Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Absolute Software Names New Chief Executive Officer

Absolute Software Corporation, a maker of endpoint security and management solutions for computers and mobile devices, announced on Friday that it has appointed Geoff Haydon as Chief Executive Officer and as a member of the Board of Directors.

Absolute Software Corporation, a maker of endpoint security and management solutions for computers and mobile devices, announced on Friday that it has appointed Geoff Haydon as Chief Executive Officer and as a member of the Board of Directors.

Most recently serving as Chief Operating Officer for EMC’s Asia-Pacific and Japan region, Haydon brings more than 20 years of IT experience to security firm.

Prior to serving in the COO role, Haydon was Vice President of Americas Sales at EMC’s RSA Security unit.

Haydon will join Absolute on July 7 and relocate to the company’s corporate head office in Vancouver, Canada, the company said.

Additionally, as part of a management shakeup, Rob Chase, Absolute’s Chief Operating Officer, has announced that he is leaving the Company effective June 18.

Chase will continue to be involved with the company in limited capacity as a strategic advisor. Errol Olsen, who has served as interim Chief Executive Officer, will continue in his role as Absolute’s Chief Financial Officer, the company said.

The company came under fire earlier this year when researchers from Kaspersky Lab claimed that Absolute’s Computrace agent, marketed as a product that can help organizations track and secure their endpoints, could be used as a springboard for attackers. Additionally, because the Computrace agent resides in the firmware of many popular laptop and desktop computers, it is difficult to remove, the report said.

Absolute Software fired back at Kaspersky Lab’s assertion that its Computrace software can be exploited by hackers, saying that the installation process is under the full control of the Absolute Computrace administrator and once the installation is complete, the communication is secure and uses encryption as well as authentication of the host server to reject attacks as described in the Kaspersky report. 

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem