CyberArk. Bridging the Gap to Third Party Devices, Applications and Operating Systems
The overall strength of a privileged account security solution can be measured…
Boldon James. The people problem - security’s biggest blind spot
How organisations can turn their biggest security threat — people…
Proper Disaster Recovery Planning 2018
The backup and disaster recovery industry has seen plenty of changes over the…
What’s new in Intercept X?
Intercept X has taken the security world by storm. And it just keeps getting…
Sophos scores with Innovation in Technology award
We continue to be recognized for our groundbreaking, next-gen technology,…
CyberArk acquires Vaultive to advance privileged account security for the cloud
CyberArk, the global leader in privileged account security, announced…
Intercept X: exploring deep learning
Deep learning is a powerful, groundbreaking tool for keeping unknown threats…
Trustwave Positioned in the Leaders Quadrant of Gartner’s Magic Quadrant for Managed Security Services, Worldwide
Trustwave today announced that Gartner, Inc., a leading information and…
CyberArk Survey: 46 Percent of Organizations Fail to Change Security Strategy After a Cyber Attack
According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly…
Sophos Mobile 8: secure your devices and endpoints with ease
Barcelona in the springtime: there’s so many reasons to want to visit…
Phish Threat: upgrade your staff
Phishing has been a go-to tactic for criminals for decades but it remains as…
XG Firewall: Taking firewalls to the next level
It’s been a huge few months for XG Firewall with the successful launch…
Intercept X: the threat researcher’s view
We’re really excited about the latest version of Intercept X, our…
CyberArk Named Top Privileged Account Security Solution for Government Agencies
CyberArk, the global leader in privileged account security,announced it was…
Intercept X: put to the test
ESG Labs recently reviewed the latest version of Sophos Intercept X, testing…
How your firewall can save you from the next ransomware attack
Everyone knows we need firewalls but, as any good network admin will tell you,…
Understanding ransomware and the impact of repeated attacks
We know ransomware is one of the greatest threats in cybersecurity currently,…
Cryptominers on Google Play: how Sophos protects customers
SophosLabs continues to see an increase in web-based cryptominers that quietly…
Sophos is a leader in the Endpoint Protection Platform Magic Quadrant
Sophos has once again been named a “Leader” in the Gartner Magic…
Intercept X: see the future…
Today we are very excited to announce the launch of the latest version of…
SophosLabs. Super Antivirus 2018, it isn’t super and it’s not an antivirus
Our researchers have been investigating the growing number of untrustworthy…
Boldon James. 8 game-changing data trends that will impact businesses in 2018
The convergence of data management technologies, the increased focus on…
The solution to next-gen firewall problems?
We’ve explored common network security problems related to protection,…
CyberArk Labs: Evolution of Credential Theft Techniques
In the past year, organizations continued to struggle to address cyber…
CyberArk. Using Azure, AWS or Google? Protect Privileged Accounts in the Cloud
CyberArk enables organizations to protect cloud assets by providing powerful…
Boldon James. Seven reasons to classify your data
The best way to protect and govern your data is to let it tell your business…
CyberArk. Security is a commercial reality
With high profile breach revelations seemingly part of the weekly news cycle…
CyberArk. Countdown to GDPR: Responding to the 72-hour Notification of a Personal Breach
Here’s a million dollar question (which could quite literally be a…
SophosLabs: a look at 5 Ransomware as a Service (Raas) kits
In the past year, SophosLabs has tracked the steady proliferation of…