Boldon James. The 5 Steps to Effective Data Classification: Identify
Using data classification as part of a strategy to secure corporate data assets…
Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data
Despite the past year’s global focus on GDPR and other data privacy regulations…
Sophos. Would you fall for a BEC attack?
Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit…
Sophos. The security of machine learning
Artificial intelligence and machine learning are persistently in the headlines…
CyberArk Docs: Privileged Access Security Documentation for All
Not long ago on the CyberArk Conjur blog, our DevOps community manager and…
Sophos. 3 reasons attackers love your servers
37% of cyberattacks are discovered on servers, making them the most likely…
CyberArk. Where Security Accountability Stops and Starts in the Public Cloud
For years, security was cited as a prime reason not to put sensitive data or…
CyberArk. Privileged Access Key to China’s Attack on Telecoms
The recent attack by China on Cellular companies – called Operation Soft Cell –…
Sophos. 5 ways to avoid a GDPR fine
In the last week both British Airways (BA) and Marriott Hotels have hit the…
Sophos. 7 best practices for securing the public cloud
Given the simplicity and cost-effectiveness of the public cloud, it’s no…
How Intercept X Advanced can help you avoid becoming a ransomware victim
Tourists aren’t the only ones looking at Florida this summer. As the Sunshine…
More fantastic test results for Sophos Intercept X
Sophos Intercept X continues to perform well in third party tests, and we…
Sophos Mobile Security earns full marks in AV-Test Android malware review
Since September 2014 (that makes 29 tests in a row!), Sophos Mobile Security…
Calling all developers – SophosLabs APIs are here!
At Sophos, we appreciate how hard it is to solve security problems when…
Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address
Cybercriminals are becoming increasingly proficient at infiltrating enterprises…
CyberArk Introduces Privileged Access Security Assessment Tool
Privileged access security is a key pillar of an effective security program. We…
Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy
As Shep Hyken recently noted, personalization continues to become more personal…
Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe
Cybersecurity isn’t getting any easier. To better understand the day-to-day…
BlueKeep: firewall best practices from Sophos
CVE-2019-07-08, nicknamed BlueKeep, is a critical remote code execution…
Sophos has acquired MDR specialists Rook Security
Cybercriminals are resourceful, organized and relentless, and businesses need…
Sophos. Intercept X for Server – now with EDR
Sophos announced the launch of Intercept X Advanced for Server with EDR,…
Boldon James. GDPR One Year On… What Have We Learnt?
It’s now one year on since the GDPR came in to effect – a regulation with an…
Trustwave. So, You’ve Been Breached: 9 Steps to Mitigate the Fallout
Discovering that you’ve been the victim of a breach is never pleasant. Perhaps…
Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like
Serving as the storekeeper of your most sensitive assets, from college…
GlobalSign supports newly implemented EU electronic invoicing regulation
GlobalSign (www.globalsign.com), a global Certificate Authority (CA) and…
Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt
As organizations learn that sophisticated attackers are dwelling unnoticed on…
SC Labs awards Sophos XG Firewall five stars
SC Media recently reviewed XG Firewall and awarded it their top 5-star rating…
Sophos. How Intercept X stops MegaCortex ransomware
This month, SophosLabs has been examining a new ransomware attack called…
Boldon James. Accountability the Next Step in Data Protection
The UK’s Information Commissioner stressed in a speech that nearly one year…
Boldon James. How much does the average employee know about data privacy?
With the impacts and repercussions of the looming California Consumer Privacy…