Boldon James. Data Breach Trends – Are You In The Know?
Data breaches are on the rise – it’s a fact. In times like these, it’s…
Sophos. Why organizations need intelligent EDR
To understand the need for Endpoint Detection and Response (EDR), let’s begin…
Sophos. Firewall best practices to protect against ransomware
Ransomware has recently vaulted to the top of the news again, as devastating…
Sophos named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms… again
For the 11th time in the last 11 reports, Sophos has been named a Leader in…
Boldon James. The 5 Steps to Effective Data Classification: Classify
A corporate data security policy that sets out how valuable information should…
Boldon James. The 5 Steps to Effective Data Classification: Discover
By classifying data according to its value or sensitivity, organisations can…
Boldon James. The 5 Steps to Effective Data Classification: Identify
Using data classification as part of a strategy to secure corporate data assets…
Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data
Despite the past year’s global focus on GDPR and other data privacy regulations…
Sophos. Would you fall for a BEC attack?
Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit…
Sophos. The security of machine learning
Artificial intelligence and machine learning are persistently in the headlines…
CyberArk Docs: Privileged Access Security Documentation for All
Not long ago on the CyberArk Conjur blog, our DevOps community manager and…
Sophos. 3 reasons attackers love your servers
37% of cyberattacks are discovered on servers, making them the most likely…
CyberArk. Where Security Accountability Stops and Starts in the Public Cloud
For years, security was cited as a prime reason not to put sensitive data or…
CyberArk. Privileged Access Key to China’s Attack on Telecoms
The recent attack by China on Cellular companies – called Operation Soft Cell –…
Sophos. 5 ways to avoid a GDPR fine
In the last week both British Airways (BA) and Marriott Hotels have hit the…
Sophos. 7 best practices for securing the public cloud
Given the simplicity and cost-effectiveness of the public cloud, it’s no…
How Intercept X Advanced can help you avoid becoming a ransomware victim
Tourists aren’t the only ones looking at Florida this summer. As the Sunshine…
More fantastic test results for Sophos Intercept X
Sophos Intercept X continues to perform well in third party tests, and we…
Sophos Mobile Security earns full marks in AV-Test Android malware review
Since September 2014 (that makes 29 tests in a row!), Sophos Mobile Security…
Calling all developers – SophosLabs APIs are here!
At Sophos, we appreciate how hard it is to solve security problems when…
Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address
Cybercriminals are becoming increasingly proficient at infiltrating enterprises…
CyberArk Introduces Privileged Access Security Assessment Tool
Privileged access security is a key pillar of an effective security program. We…
Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy
As Shep Hyken recently noted, personalization continues to become more personal…
Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe
Cybersecurity isn’t getting any easier. To better understand the day-to-day…
BlueKeep: firewall best practices from Sophos
CVE-2019-07-08, nicknamed BlueKeep, is a critical remote code execution…
Sophos has acquired MDR specialists Rook Security
Cybercriminals are resourceful, organized and relentless, and businesses need…
Sophos. Intercept X for Server – now with EDR
Sophos announced the launch of Intercept X Advanced for Server with EDR,…
Boldon James. GDPR One Year On… What Have We Learnt?
It’s now one year on since the GDPR came in to effect – a regulation with an…
Trustwave. So, You’ve Been Breached: 9 Steps to Mitigate the Fallout
Discovering that you’ve been the victim of a breach is never pleasant. Perhaps…
Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like
Serving as the storekeeper of your most sensitive assets, from college…