GlobalSign supports newly implemented EU electronic invoicing regulation

GlobalSign (www.globalsign.com), a global Certificate Authority (CA) and…


Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt

As organizations learn that sophisticated attackers are dwelling unnoticed on…


SC Labs awards Sophos XG Firewall five stars

SC Media recently reviewed XG Firewall and awarded it their top 5-star rating…


Sophos. How Intercept X stops MegaCortex ransomware

This month, SophosLabs has been examining a new ransomware attack called…


Boldon James. Accountability the Next Step in Data Protection

The UK’s Information Commissioner stressed in a speech that nearly one year…


Boldon James. How much does the average employee know about data privacy?

With the impacts and repercussions of the looming California Consumer Privacy…


Boldon James. Enterprises Must Take Insider Threats More Seriously

Security teams need to consider the possibility of internal as well as external…


CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported

In May, it will be a year since the enforcement of the EU GDPR began. In the…


CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

CyberArk is honored to be named a 5-Star Security Vendor – the highest rating…


Sophos. Searching for malicious PowerShell executions with Intercept X

Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not…


Sophos. SD-WAN and XG Firewall

Few terms in networking have generated as much buzz recently as SD-WAN (or…


9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk

NSS together with CyberArk and Sophos will inform you of the latest cyber…


Sophos Cloud Optix is solving the toughest challenges in public cloud security

You move to the public cloud with the dream of infrastructure cost savings,…


How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks

Earlier this week, news broke that a Chinese woman attempted to sneak a USB…


Making the most of your Sophos XG Firewall

XG Firewall v17.5 recently delivered several new innovations including Lateral…


CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation

The age of digital transformation is upon us. Cloud, virtualization and…


AV-Test and AV-Comparatives give Sophos Mobile Security 100%

AV-Comparatives recently tested 250 Android security apps available on the…


Sophos. A connected approach to compromised mailbox security

Your mailbox is more valuable than ever to attackers, with 93% of company…


CyberArk Version 10.8 Flies High in the Cloud

During this year’s RSA conference (visit us at booth #N6253!), CyberArk…


Boldon James. Healthcare Breaches Affected 11.5 Million People In 2018

he total number of records exposed in the healthcare sector rose to 11.5…


7 uncomfortable truths of Endpoint Security: A Sophos report

A report released today by Sophos reveals that IT managers are more likely to…


And the Award Goes To…The GlobalSign IoT Identity Platform!

Strong, unique identities are the core of IoT device security. Giving unique…


Sophos Intercept X Achieves Highest Scores in NSS Labs 2019 Advanced Endpoint Protection (AEP) Group Test

Sophos is a strong advocate for thorough independent testing of cybersecurity…


7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security

CyberArk aims to make implementing and managing a robust privileged access…


Sophos Central Architect Training (20-22 March, 2019)

This course provides an in-depth study of Sophos Central, designed for…


CyberArk. Stay Safe with Proven Privileged Access Security

Daily morning headlines from Dark Reading, Krebs on Security, ThreatPost and…


Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security

The corporate network perimeter defensive line no longer exists. With…


XG Firewall joins Sophos Central

Today we’re excited to announce that XG Firewall, our flagship next-generation…


Trustwave: How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface

I recently listened to a podcast discussing the expanding legalization of…


Boldon James. What Financial Services Executives Need To Know About Data Security

The financial services industry experiences 35% of all data breaches, earning…