Corero: Industry Observations of DDoS Trends

Observing and analyzing DDoS attacks over a period of time helps us all…


Are you protecting your Macs? See how to avoid “Mac malice” and other IT sins

Macs are gaining ground on PCs everywhere, including at the office. Companies…


Why choose Sophos Endpoint Protection? Lightning performance that won’t slow users down

Our customers rely on us for innovative protection against today’s…


Sophos Web Appliance v4 available end of March

Τhe easiest Secure Web Gateway with the best protection is getting a…


Sophos at Mobile World Congress: Hacking mobile devices and the Internet of Things

The security of mobile devices and the Internet of Things is surprisingly lax,…


Why choose Sophos Endpoint Protection? Our innovative technology and threat intelligence

Today’s endpoint protection needs to do much more than blocking known…


Anatomy of a ransomware attack: CryptoLocker, CryptoWall, and how to stay safe

Ransomware, it’s everywhere. We had hoped that the notorious…


Sophos wins Best Usability Award from AV-Test

We’re pleased to announce that Sophos has been recognized with the…


Sophos Mobile Security aces AV-Test review with 100% Android malware detection

The expert product reviewers at AV-Test handed out awards for the best…


Facebook's DeepFace facial recognition technology has human-like accuracy

Facial recognition technology has been around for many years - the fact that…


Array: Multi-Tenant = Multi-Benefit. Meet the Enhanced AVX10650.

Array announced the second generation of the AVX10650 virtualized application…


Array: A Hybrid Virtual/Dedicated Model for SSL/TLS Offloading

In virtualized environments, SSL/TLS data encryption is commonly used to secure…


Corero: The double-edged sword of operating a hosting data center

The more customers you host in your data center, the better, right?  Of…


Sophos products and the GHOST vulnerability affecting Linux

In the last couple of days, a widespread Linux vulnerability known as GHOST has…


Forrester: Sophos is a “breakout star” and a leader in endpoint encryption

It’s an honor to announce that we have been positioned as a Leader in…


Logpoint. EU General Data Protection Regulation challenge European enterprise and organizations

Enterprises and organizations throughout the EU are facing major challenges in…


Sophos: Introducing Next-Gen Enduser Protection

Today, we’re pleased to introduce updates to our Endpoint…


AV-Comparatives tests prove Sophos beats the other guys

Lots of customers are looking to switch from big security vendors like…


Next-Generation Enduser Protection. Thinking outside the (sand)box

If you Innovation is the one constant in the security industry, as both hackers…


5 things you should know about the EU Data Protection Regulation

If you haven’t heard about it by now, it’s time you learned more…


EU to demand 2-factor for online payments by August 2015?

The European Banking Authority (EBA), the EU body tasked with supervising and…


The top 6 retail threats and how to stop them

The weeks leading up to Christmas are the busiest for the retail industry all…


Astaro Security Gateway V8 is End-of-Life March 31st, 2015

Back in June 2013, we announced the End of Life date for ASG V8 as December 31,…


10 predictions for security threats in 2015 and beyond

After a year of big data breaches like Home Depot and Sony, and widespread…


Sophos Expands Cloud-Managed Security Portfolio with Server Protection

Sophos announced the release of Sophos Cloud Server Protection, a high…


Sophos UTM Advantage (9.3) is coming soon – find out what’s new!

We’re pleased to commence the roll-out of our latest major UTM software…


Sophos Delivers the Industry’s Most Complete Security for Android Devices

Recently recognized as an enterprise mobility management (EMM) market leader by…