CyberArk. Bridging the Gap to Third Party Devices, Applications and Operating Systems

The overall strength of a privileged account security solution can be measured…


Boldon James. The people problem - security’s biggest blind spot

How organisations can turn their biggest security threat — people…


Proper Disaster Recovery Planning 2018

The backup and disaster recovery industry has seen plenty of changes over the…


What’s new in Intercept X?

Intercept X has taken the security world by storm. And it just keeps getting…


Sophos scores with Innovation in Technology award

We continue to be recognized for our groundbreaking, next-gen technology,…


CyberArk acquires Vaultive to advance privileged account security for the cloud

CyberArk, the global leader in privileged account security,  announced…


Intercept X: exploring deep learning

Deep learning is a powerful, groundbreaking tool for keeping unknown threats…


CyberArk Survey: 46 Percent of Organizations Fail to Change Security Strategy After a Cyber Attack

According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly…


Sophos Mobile 8: secure your devices and endpoints with ease

Barcelona in the springtime: there’s so many reasons to want to visit…


Phish Threat: upgrade your staff

Phishing has been a go-to tactic for criminals for decades but it remains as…


XG Firewall: Taking firewalls to the next level

It’s been a huge few months for XG Firewall with the successful launch…


Intercept X: the threat researcher’s view

We’re really excited about the latest version of Intercept X, our…


CyberArk Named Top Privileged Account Security Solution for Government Agencies

CyberArk, the global leader in privileged account security,announced it was…


Intercept X: put to the test

ESG Labs recently reviewed the latest version of Sophos Intercept X, testing…


Sophos Home Premium is here

There’s an increasing amount of time and attention focused on keeping…


How your firewall can save you from the next ransomware attack

Everyone knows we need firewalls but, as any good network admin will tell you,…


Understanding ransomware and the impact of repeated attacks

We know ransomware is one of the greatest threats in cybersecurity currently,…


Cryptominers on Google Play: how Sophos protects customers

SophosLabs continues to see an increase in web-based cryptominers that quietly…


Sophos is a leader in the Endpoint Protection Platform Magic Quadrant

Sophos has once again been named a “Leader” in the Gartner Magic…


Intercept X: see the future…

Today we are very excited to announce the launch of the latest version of…


SophosLabs. Super Antivirus 2018, it isn’t super and it’s not an antivirus

Our researchers have been investigating the growing number of untrustworthy…


Boldon James. 8 game-changing data trends that will impact businesses in 2018

The convergence of data management technologies, the increased focus on…


The solution to next-gen firewall problems?

We’ve explored common network security problems related to protection,…


CyberArk Labs: Evolution of Credential Theft Techniques

In the past year, organizations continued to struggle to address cyber…


CyberArk. Using Azure, AWS or Google? Protect Privileged Accounts in the Cloud

CyberArk enables organizations to protect cloud assets by providing powerful…


Boldon James. Seven reasons to classify your data

The best way to protect and govern your data is to let it tell your business…


CyberArk. Security is a commercial reality

With high profile breach revelations seemingly part of the weekly news cycle…


CyberArk. Countdown to GDPR: Responding to the 72-hour Notification of a Personal Breach

Here’s a million dollar question (which could quite literally be a…


SophosLabs: a look at 5 Ransomware as a Service (Raas) kits

In the past year, SophosLabs has tracked the steady proliferation of…