Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part II)

Vulnerability Assessment Builds Security Continuous Improvement Into your…


2018 NSS Labs NGFW retest results for XG Firewall

Sophos is committed to providing you with the best protection, performance and…


Sophos Mobile: Day zero support for iOS 12

Apple’s iOS 12 is being released to the public today, and the great news is…


The art of unboxing: Sophos APX Series access points

We’ve watched plenty of software demos over the years, be they with or without…


Sophos Email: Delivering on security and visibility

The latest enhancements for Sophos Email Standard and Advanced customers…


Netsparker. Vulnerability Assessments and Penetration Tests – What's the Difference? (Part I)

Confusion between the terms 'penetration testing' and 'vulnerability…


Sophos Security Heartbeat. Look who’s talking now: Your Wi-Fi, endpoints, mobiles…

With the introduction of Sophos Wireless v2.0 and the new APX Series Access…


Logpoint. Why anti-virus alone can’t stop cryptocurrency mining

Cryptocurrencies like Bitcoin have been a source of worry since their creation.…


Sophos XG Architect Training (October 29-31, 2018)

This three-day training program was designed and intended for experienced…


Sophos gets top marks in CRN’s 2018 Annual Report Card

At Sophos, we believe in being “channel best,” which is why we’re proud to…


Take a tour of Sophos Central’s Endpoint and Intercept X Protection

There are numerous things you can do with Sophos Central, our cloud-based…


CyberArk Launches SAP-certified Privileged Access Security Solution

CyberArk, the global leader in privileged access security, today announced the…


Phish Threat’s security awareness training gets animated

Real-life cyber threat headlines, Hollywood scripts and great animations come…


Privileged Access Security for Dummies: A Practical, "How-To" Guide from CyberArk

Savvy security practitioners understand that one of the most important,…


How to make the most of your Sophos Endpoint

Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as…


Sophos. What is… cryptojacking?

To understand what cryptojacking is, you first need to understand……


Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise…