Boldon James. Data Breach Trends – Are You In The Know?

Data breaches are on the rise – it’s a fact. In times like these, it’s…


Sophos. Why organizations need intelligent EDR

To understand the need for Endpoint Detection and Response (EDR), let’s begin…


Sophos. Firewall best practices to protect against ransomware

Ransomware has recently vaulted to the top of the news again, as devastating…


Sophos named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms… again

For the 11th time in the last 11 reports, Sophos has been named a Leader in…


Boldon James. The 5 Steps to Effective Data Classification: Classify

A corporate data security policy that sets out how valuable information should…


Boldon James. The 5 Steps to Effective Data Classification: Discover

By classifying data according to its value or sensitivity, organisations can…


Boldon James. The 5 Steps to Effective Data Classification: Identify

Using data classification as part of a strategy to secure corporate data assets…


Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data

Despite the past year’s global focus on GDPR and other data privacy regulations…


Sophos. Would you fall for a BEC attack?

Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit…


Sophos. The security of machine learning

Artificial intelligence and machine learning are persistently in the headlines…


CyberArk Docs: Privileged Access Security Documentation for All

Not long ago on the CyberArk Conjur blog, our DevOps community manager and…


Sophos. 3 reasons attackers love your servers

37% of cyberattacks are discovered on servers, making them the most likely…


CyberArk. Where Security Accountability Stops and Starts in the Public Cloud

For years, security was cited as a prime reason not to put sensitive data or…


CyberArk. Privileged Access Key to China’s Attack on Telecoms

The recent attack by China on Cellular companies – called Operation Soft Cell –…


Sophos. 5 ways to avoid a GDPR fine

In the last week both British Airways (BA) and Marriott Hotels have hit the…


Sophos. 7 best practices for securing the public cloud

Given the simplicity and cost-effectiveness of the public cloud, it’s no…


How Intercept X Advanced can help you avoid becoming a ransomware victim

Tourists aren’t the only ones looking at Florida this summer. As the Sunshine…


More fantastic test results for Sophos Intercept X

Sophos Intercept X continues to perform well in third party tests, and we…


Sophos Mobile Security earns full marks in AV-Test Android malware review

Since September 2014 (that makes 29 tests in a row!), Sophos Mobile Security…


Calling all developers – SophosLabs APIs are here!

At Sophos, we appreciate how hard it is to solve security problems when…


Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address

Cybercriminals are becoming increasingly proficient at infiltrating enterprises…


CyberArk Introduces Privileged Access Security Assessment Tool

Privileged access security is a key pillar of an effective security program. We…


Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy

As Shep Hyken recently noted, personalization continues to become more personal…


Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe

Cybersecurity isn’t getting any easier. To better understand the day-to-day…


BlueKeep: firewall best practices from Sophos

CVE-2019-07-08, nicknamed BlueKeep, is a critical remote code execution…


Sophos has acquired MDR specialists Rook Security

Cybercriminals are resourceful, organized and relentless, and businesses need…


Sophos. Intercept X for Server – now with EDR

Sophos announced the launch of Intercept X Advanced for Server with EDR,…


Boldon James. GDPR One Year On… What Have We Learnt?

It’s now one year on since the GDPR came in to effect – a regulation with an…


Trustwave. So, You’ve Been Breached: 9 Steps to Mitigate the Fallout

Discovering that you’ve been the victim of a breach is never pleasant. Perhaps…


Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like

Serving as the storekeeper of your most sensitive assets, from college…