Boldon James. Should You Really Strive For Simple?

You are a successful business, but what are your aims for data classification?…


Sophos Intercept X Named Best Endpoint Security Solution by CRN

Sophos, a global leader in next-generation cloud-enabled cybersecurity…


CyberArk. The Top Cybersecurity Trends That Will Shape 2020

As we embark on a new year, it’s normal to think about what the future will…


Intercept X for Mobile aces Miercom’s MTD Industry Assessment

Hot on the heels of the Intercept X for Mobile announcement, we’re delighted to…


Sophos Intercept X for Mobile is here!

We're excited to announce that Sophos Mobile Security will become Sophos…


Sophos EDR gets enhanced with new features

"Where do I start?" is one of the most common questions we get asked about…


CyberArk. How Do You Prioritize Risk for Privilege Access Management?

For many organizations implementing privileged access management (PAM) has…


Sophos. The cost of errors in the public cloud

Who’s in charge of security in the public cloud? It may sound like an odd…


Sophos. Firewall group management just got easier

Since XG Firewall joined Sophos Central earlier this year, we’ve been steadily…


Switching from Symantec to Sophos just got even easier

If you’re planning a migration from Symantec Endpoint Protection (SEP), or…


Sophos. Enhanced protection comes to Intercept X

Intercept X has launched a new early access program (EAP) that brings…


Boldon James. The User-Driven Approach: 3 Main Benefits

We’ve seen the introduction to user-driven security, and the three main steps…


Sophos XG Firewall v18 early access is now available

We are excited to open the Early Access Program (EAP) of XG Firewall v18 to all…


Sophos Cloud Optix now available on AWS Marketplace

s modern organizations are evolving their use of the public cloud to leverage…


Sophos. Rolling back Ryuk Ransomware

In recent weeks SophosLabs has seen a significant spike in Ryuk ransomware.…


Sophos launches Managed Threat Response service

We’re very excited to extend our customers’ protection against the most…


CyberArk Privilege Cloud Now Available on AWS Marketplace

CyberArk is pleased to announce that our as-a-service CyberArk Privilege Cloud…


Sophos. Three Questions to Ask of Your Endpoint Solution Before Ransomware Hits

It’s crucial it is that your defenses evolve faster than the attacks. To help…


Boldon James. The User-Driven Approach: 3 Main Steps

Following on from our introduction to user-driven security, and why people are…


Sophos is a Visionary in the Network Firewall Magic Quadrant 2019

We’re delighted to announce that Gartner has named Sophos a Visionary in the…


Boldon James. User-Driven Security: Transforming People Into Security Assets

Artificial Intelligence, User Behaviour Analytics, Zero-Trust… these are the…


Sophos. Intercept X cleans up in endpoint protection test

Sophos Intercept X has beaten 11 other endpoint protection products in the…


Sophos Intercept X Advanced Ranks as Industry-Best for Endpoint Threat Protection in Inaugural Report

Sophos, a global leader in network and endpoint security, today announced it…


Sophos. Ransomware is Bigger Than Ever.

News hit this week that 22 government organizations in the Lone Star State were…


Boldon James. Data Breach Trends – Are You In The Know?

Data breaches are on the rise – it’s a fact. In times like these, it’s…


Sophos. Why organizations need intelligent EDR

To understand the need for Endpoint Detection and Response (EDR), let’s begin…


Sophos. Firewall best practices to protect against ransomware

Ransomware has recently vaulted to the top of the news again, as devastating…


Sophos named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms… again

For the 11th time in the last 11 reports, Sophos has been named a Leader in…


Boldon James. The 5 Steps to Effective Data Classification: Classify

A corporate data security policy that sets out how valuable information should…


Boldon James. The 5 Steps to Effective Data Classification: Discover

By classifying data according to its value or sensitivity, organisations can…