HelpSystems. Secure data sharing solves three cybersecurity challenges

When searching for security solutions for your organization, it may be easy to…


Datto. What Is SaaS Protection (Software as a Service)? (Part 2)

Datto. What Is SaaS Protection (Software as a Service)? (Part 2) Why the SaaS…


HelpSystems. Keeping Cloud Security Top Priority in Your Digital Transformation

Times are changing—employees are working from home, using more devices, and…


Datto. What Is SaaS Defense (Software as a Service)? (Part 1)

Datto. What Is SaaS Defense (Software as a Service)? (Part 1)SaaS stands for…


Sophos. Understanding data backups

There is a maxim in the business continuity market that says that a backup on…


HelpSystems. New Data Security Strategies for 2022

3 Data Centric Security Strategies for 2022 Despite massive growth in data…


Sophos. ZTNA strengthens security controls for remote workers

Remote access has been a component of the network since the days of acoustic,…


Sophos Firewall OS v18.5 MR3 is Now Available

The product team is pleased to announce the latest maintenance release update…


Datto. Top 20 Most Common Hacker Behaviors

When the OWASP Top 20 Vulnerabilities was first published it revolutionized our…


SEP sesam Jaglion. Strong. Elegant. Adaptable

SEP sesam version Jaglion - the hybrid of jaguar and lion symbolises the…


Datto. Conti Ransomware - How it Works and 4 Ways to Protect Yourself

What is Conti Ransomware? Conti is a ransomware-as-a-service (RaaS) affiliate…


Sophos. Optimizing Breach Prevention: Stop Them Before They Get In

In sports, there is a saying that if the opponent cannot score, they cannot…


Array. Top 5 Web Application Security Practices That Can Save You from Attacks in 2022

On May 7, 2021, the largest oil pipeline system in the US suffered a major…


Sophos. Five Tips to Better Protect Yourself During the Current Russia-Ukraine Crisis

The current Russia-Ukraine crisis is unprecedented. One aspect of the current…


Why Sophos ZTNA is better

Sophos ZTNA provides a number of advantages over remote-access VPN – enabling…


The New Normal in Cybersecurity: Exploring the Top Three 2022 Predictions (Part 2)

In The New Normal in Cybersecurity Part 1, we examined three leading trends in…


The New Normal in Cybersecurity: Examining the Top Three 2021 Trends (Part 1)

Τhe past year has shown organizations that uncertainty and a transformed…


Sophos XDR: Enhanced Investigations and Office 365 Integration

We are pleased to announce exciting enhancements to the Investigations…


HelpSystems. 4 Ways to Use SIEM for SMB

Security Information and Event Management (SIEM) solutions are often seen as a…


Sophos recognized on CRN’s Cloud 100 list for 2022

At Sophos, we’re committed to helping organizations secure essential resources…


Sophos. Ransomware attacks drive ZTNA adoption

A study of 5,400 IT professionals has revealed a correlation between direct…


Archiving Microsoft 365 Emails for New MailStore Server Customers

We created our blog series Tech Tips to familiarize all interested parties,…


HelpSystems. Choosing the Right Data Security Solution

In a world in which the data threat landscape is becoming bigger, stronger, and…


The most powerful parts of Sophos Central? The ones nobody notices

There's a lot of going on quietly in the background with Sophos Central, the…


BeyondTrust. Essential Cybersecurity Survival Strategies for 2022 & Beyond

In cyberspace, there exists no safe harbor. Every organization with a digital…


Multi-cloud threat detection and response with Sophos XDR

Sophos Extended Detection and Response (XDR) now goes even further in the…


Sophos ZTNA is now available!

We’re starting off the new year with a big announcement – a new Sophos…


HelpSystems. How Your Business Can Benefit from End-to-End Automation

Automation used to be a tool that was almost exclusively used in the…