Logpoint. Did you have coffee with a hacker this morning?

Your organization likely spends resources in preventing external breaches and…


Boldon James. Bridging The Chasm Between Security And Data Management

The primary reason most organisations look at classifying the data they create…


See the future of cybersecurity with the new version of Sophos Home

The new version of Sophos Home brings business-grade cybersecurity to your…


Sophos Acquires DarkBytes as Foundation of New MDR Services

Sophos, a global leader in network and endpoint security, today announced that…


Boldon James. True Data Privacy Cannot Exist Without Addressing The Insider Threat

Protecting sensitive customer data is a huge priority for today’s…


Stopping Emotet with Sophos

The US Department for Homeland Security considers Emotet to be one of the most…


CyberArk. The CISO View on DevOps: New Report Highlights Approaches to Reduce Cyber Security Risk

CyberArk, the global leader in privileged access security, today issued a new…


XG Firewall and Lateral Movement Protection

Sophos XG Firewall and Synchronized Security continue to innovate and push the…


Sophos Acquires Avid Secure to Expand Protection for Public Cloud Environments

Sophos, a global leader in network and endpoint security, today announced that…


Sophos XG Architect Training (February 26-28, 2019)

This three-day training program was designed and intended for experienced…


What the experts are saying about Sophos XG Firewall?

We know from talking to our customer and partner community that XG Firewall…


Sophos. The internal security challenge, and what this means for you in 2019

It’s the beginning of a new year, and we should take some time to look the…


Amazon and Sophos increase visibility to applications and data security on AWS

Today, Amazon Web Services (AWS) announced the AWS Security Hub, with Sophos as…


Trustwave. 5 Surprising Things a Threat Hunt May Uncover

For organizations whose cyber defenses may have been going the way of one…


Boldon James. Data classification is the key to protecting information and comply with GDPR and LGPD

Martin Sugden, CEO of Boldon James, was in Brazil last week and shared a…


XG Firewall joins Sophos Central

Sophos is pleased to announce that the early access program (EAP) for XG…


Sophos. Half of users click on dodgy links. You just don’t know which half

50% of employees admit to clicking links from unknown senders. But which 50%?…


Boldon James. How Can Companies Move The Needle On Enterprise Cloud Security Risks And Compliance?

More than ever, customers understand their right to data privacy. As major…


Sophos Intercept X is the Security Innovation of the Year, again!

Sophos Intercept X with EDR has been recognized again as an industry leader.…


CyberArk Named a Leader in Gartner’s Inaugural 2018 Magic Quadrant for Privileged Access Management

Today marks a major milestone with the release of the first-ever Gartner 2018…


CyberArk Named a Leader in Privileged Identity Management by Forester

CyberArk announced it was named a Leader in “The Forrester Wave: Privileged…


Sophos Intercept X Advanced with EDR is now available

The product behind the most successful Early Access Program (EAP) in Sophos…


Sophos UTM 9.6 is now available

You know the old saying, “The rich get richer”? Well, our UTM 9 platform is…


Sophos is Security Vendor of the Year!

We’re excited to announce that we’ve been awarded Security Vendor of the Year…


For a second consecutive year, Sophos has been named a CRN Tech Innovator for Intercept X with deep learning

For a second consecutive year, Sophos has been named a CRN Tech Innovator for…


Sophos XG Firewall v17.5 early access program is now live!

The team is hard at work putting the finishing touches on our next major…


Sophos. Stunning new Phish Threat modules

Who’s responsible for cybersecurity at work? Is it the security team, the…


Sophos named among vendors with most comprehensive solutions in Gartner market guide

Sophos has already been recognized by Gartner as a leader in seven consecutive…


Sophos. On cybersecurity product testing

The testing of cybersecurity products is a contentious subject, with vendors…


Boldon James. In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Netwrix conducted a study of the major IT risks that are significant for most…