GlobalSign. Tips to Browsing the Internet Safely without Being Tracked

Protecting your online anonymity is no piece of cake. After all, today’s…


SC Media awards Sophos XG Firewall the full five stars

“This demands your attention no matter what size your…


GlobalSign. How to Spot a Phishing Website

Phishing isn’t an unfamiliar term in these parts. In a previous blog…


Sophos. Protecting the treasure trove

Ransomware has been on the computer security radar for some time now but are…


Sophos. What makes a great firewall?

We know that a firewall is the first line of defense against external threats.…


Sophos. UTM 9.5 is on its way

UTM 9.5, including many new features you’ve asked us for, is just around…


CyberArk. Your Greatest Threat Might Already Be Inside Your Network

Insider activity—both malicious and simple error—accounts for a…


Sophos. Best practice lays the foundation for defence

In the UK we have recently seen lots of headlines about cyber security and…


Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

It’s widely understood that cyber intruders and internal threat actors…


NSS, Sophos, Cyberark and Sealpath at the 7th Infocom Security Conference, 29-30 March 2017

For one more year, NSS has a strong presence at the 7th Infocom Security…


Releasing LogPoint 5.6.0

LogPoint is proud to announce LogPoint 5.6!Since the last large upgrade back…


Corero. IoT Security Is an Oxymoron

The Internet of Things (IoT) continues to be a boon to hackers and a bane to…


Sophos. Why you should put your staff to the test with phishing drills

When Sophos Phish Threat was released in January, we pointed out that: Email…


Corero: If You Haven’t Already Been DDoS’ed, Assume You Will Be

It’s no secret these days that cyber threats are rampant and varied.…


Sophos. Anti-malware is imperfect but still necessary. Here’s why.

Doctors sometimes make mistakes that harm the patient. Police often fail to…


Sophos Endpoint Exploit Prevention. Block Ransomware with the Power of Intercept X

The protection capabilities of Intercept X are now available to Endpoint…


Corero: The Importance of DDoS Attack Visibility

The field of cyber forensics is getting much more attention lately, mostly…


Corero: Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and…


Detecting Ransomware with LogPoint

Ransomware is doubtless a rising threat nowadays, putting all small,…


SophosLabs malware forecast points to rising IoT threats, more ransomware

SophosLabs has released a malware forecast to coincide with the start of RSA…


CyberArk: Don’t Analyze Everything - Analyze the Right Thing to Detect and Respond to Insider Threats

In 2013, organizations worldwide started to take insider threats seriously,…


Corero: DDoS Attacks Won't Be Blocked by Black Holing/Null Routing

Distributed denial of service (DDoS) attacks have been around since the early…


CyberArk: When Innocent Mistakes Turn Into Costly Problems

When most people hear about an “insider threat,” they often assume…


Sophos Mobile Security wins the AV-TEST Best Android Security Award

After posting an unprecedented and unbroken streak of perfect test scores in…


Sophos is a leader in Gartner Magic Quadrant for Endpoint Protection Platforms

We’re excited to share that Sophos has been named a leader in the 2017…


Introducing Sophos Phish Threat: the world’s easiest-to-use attack simulator

Our mission at Sophos is to provide the best security solutions on the market…


Increased Risks of DDoS Attacks for Ransom to Businesses

In recent weeks, the UK retail bank Lloyds was hit with a denial of service…


The challenges and opportunities for managing the Internet of Things

The Internet of Things (IoT) has been in the news lately for facilitating…


Don’t get held hostage by ransomware. Head over to the Sophos Anti-Ransomware Hub

According to official data, in 2016 alone, hackers have taken over $1 Billion…