Boldon James. Enterprises Must Take Insider Threats More Seriously
Security teams need to consider the possibility of internal as well as external…
CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported
In May, it will be a year since the enforcement of the EU GDPR began. In the…
CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide
CyberArk is honored to be named a 5-Star Security Vendor – the highest rating…
Sophos. Searching for malicious PowerShell executions with Intercept X
Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not…
Sophos. SD-WAN and XG Firewall
Few terms in networking have generated as much buzz recently as SD-WAN (or…
9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk
NSS together with CyberArk and Sophos will inform you of the latest cyber…
Sophos Cloud Optix is solving the toughest challenges in public cloud security
You move to the public cloud with the dream of infrastructure cost savings,…
How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks
Earlier this week, news broke that a Chinese woman attempted to sneak a USB…
Making the most of your Sophos XG Firewall
XG Firewall v17.5 recently delivered several new innovations including Lateral…
CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation
The age of digital transformation is upon us. Cloud, virtualization and…
AV-Test and AV-Comparatives give Sophos Mobile Security 100%
AV-Comparatives recently tested 250 Android security apps available on the…
Sophos. A connected approach to compromised mailbox security
Your mailbox is more valuable than ever to attackers, with 93% of company…
CyberArk Version 10.8 Flies High in the Cloud
During this year’s RSA conference (visit us at booth #N6253!), CyberArk…
Boldon James. Healthcare Breaches Affected 11.5 Million People In 2018
he total number of records exposed in the healthcare sector rose to 11.5…
7 uncomfortable truths of Endpoint Security: A Sophos report
A report released today by Sophos reveals that IT managers are more likely to…
And the Award Goes To…The GlobalSign IoT Identity Platform!
Strong, unique identities are the core of IoT device security. Giving unique…
Sophos Intercept X Achieves Highest Scores in NSS Labs 2019 Advanced Endpoint Protection (AEP) Group Test
Sophos is a strong advocate for thorough independent testing of cybersecurity…
7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security
CyberArk aims to make implementing and managing a robust privileged access…
Sophos Central Architect Training (20-22 March, 2019)
This course provides an in-depth study of Sophos Central, designed for…
CyberArk. Stay Safe with Proven Privileged Access Security
Daily morning headlines from Dark Reading, Krebs on Security, ThreatPost and…
Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security
The corporate network perimeter defensive line no longer exists. With…
XG Firewall joins Sophos Central
Today we’re excited to announce that XG Firewall, our flagship next-generation…
Trustwave: How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface
I recently listened to a podcast discussing the expanding legalization of…
Boldon James. What Financial Services Executives Need To Know About Data Security
The financial services industry experiences 35% of all data breaches, earning…
Logpoint. Did you have coffee with a hacker this morning?
Your organization likely spends resources in preventing external breaches and…
Boldon James. Bridging The Chasm Between Security And Data Management
The primary reason most organisations look at classifying the data they create…
See the future of cybersecurity with the new version of Sophos Home
The new version of Sophos Home brings business-grade cybersecurity to your…
Sophos Acquires DarkBytes as Foundation of New MDR Services
Sophos, a global leader in network and endpoint security, today announced that…
Boldon James. True Data Privacy Cannot Exist Without Addressing The Insider Threat
Protecting sensitive customer data is a huge priority for today’s…
Stopping Emotet with Sophos
The US Department for Homeland Security considers Emotet to be one of the most…