Boldon James. Enterprises Must Take Insider Threats More Seriously

Security teams need to consider the possibility of internal as well as external…


CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported

In May, it will be a year since the enforcement of the EU GDPR began. In the…


CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

CyberArk is honored to be named a 5-Star Security Vendor – the highest rating…


Sophos. Searching for malicious PowerShell executions with Intercept X

Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not…


Sophos. SD-WAN and XG Firewall

Few terms in networking have generated as much buzz recently as SD-WAN (or…


9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk

NSS together with CyberArk and Sophos will inform you of the latest cyber…


Sophos Cloud Optix is solving the toughest challenges in public cloud security

You move to the public cloud with the dream of infrastructure cost savings,…


How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks

Earlier this week, news broke that a Chinese woman attempted to sneak a USB…


Making the most of your Sophos XG Firewall

XG Firewall v17.5 recently delivered several new innovations including Lateral…


CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation

The age of digital transformation is upon us. Cloud, virtualization and…


AV-Test and AV-Comparatives give Sophos Mobile Security 100%

AV-Comparatives recently tested 250 Android security apps available on the…


Sophos. A connected approach to compromised mailbox security

Your mailbox is more valuable than ever to attackers, with 93% of company…


CyberArk Version 10.8 Flies High in the Cloud

During this year’s RSA conference (visit us at booth #N6253!), CyberArk…


Boldon James. Healthcare Breaches Affected 11.5 Million People In 2018

he total number of records exposed in the healthcare sector rose to 11.5…


7 uncomfortable truths of Endpoint Security: A Sophos report

A report released today by Sophos reveals that IT managers are more likely to…


And the Award Goes To…The GlobalSign IoT Identity Platform!

Strong, unique identities are the core of IoT device security. Giving unique…


Sophos Intercept X Achieves Highest Scores in NSS Labs 2019 Advanced Endpoint Protection (AEP) Group Test

Sophos is a strong advocate for thorough independent testing of cybersecurity…


7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security

CyberArk aims to make implementing and managing a robust privileged access…


Sophos Central Architect Training (20-22 March, 2019)

This course provides an in-depth study of Sophos Central, designed for…


CyberArk. Stay Safe with Proven Privileged Access Security

Daily morning headlines from Dark Reading, Krebs on Security, ThreatPost and…


Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security

The corporate network perimeter defensive line no longer exists. With…


XG Firewall joins Sophos Central

Today we’re excited to announce that XG Firewall, our flagship next-generation…


Trustwave: How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface

I recently listened to a podcast discussing the expanding legalization of…


Boldon James. What Financial Services Executives Need To Know About Data Security

The financial services industry experiences 35% of all data breaches, earning…


Logpoint. Did you have coffee with a hacker this morning?

Your organization likely spends resources in preventing external breaches and…


Boldon James. Bridging The Chasm Between Security And Data Management

The primary reason most organisations look at classifying the data they create…


See the future of cybersecurity with the new version of Sophos Home

The new version of Sophos Home brings business-grade cybersecurity to your…


Sophos Acquires DarkBytes as Foundation of New MDR Services

Sophos, a global leader in network and endpoint security, today announced that…


Boldon James. True Data Privacy Cannot Exist Without Addressing The Insider Threat

Protecting sensitive customer data is a huge priority for today’s…


Stopping Emotet with Sophos

The US Department for Homeland Security considers Emotet to be one of the most…