Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment

Defence organisations encompass two very different communication environments.…


Sophos Mobile gets in sync with Google Cloud Identity

Onboarding new devices to management policy controls includes the important…


The best just got better. Intercept X now with EDR

We are very excited to announce the launch of Sophos Intercept X Advanced with…


Boldon James: Data breach reports see 75% increase in last two years

Data breaches are up 75% in two years, finds a report from the Information…


Sophos recognized for anti-ransomware success at Channelnomics Awards

We are thrilled to announced that we’ve won the award for Best Anti-Ransomware…


Sophos is named a Leader in the Gartner UTM Magic Quadrant

We’re very pleased to announce that for the 7th consecutive year, Gartner…


Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part II)

Vulnerability Assessment Builds Security Continuous Improvement Into your…


2018 NSS Labs NGFW retest results for XG Firewall

Sophos is committed to providing you with the best protection, performance and…


Sophos Mobile: Day zero support for iOS 12

Apple’s iOS 12 is being released to the public today, and the great news is…


The art of unboxing: Sophos APX Series access points

We’ve watched plenty of software demos over the years, be they with or without…


Sophos Email: Delivering on security and visibility

The latest enhancements for Sophos Email Standard and Advanced customers…


Netsparker. Vulnerability Assessments and Penetration Tests – What's the Difference? (Part I)

Confusion between the terms 'penetration testing' and 'vulnerability…


Sophos Security Heartbeat. Look who’s talking now: Your Wi-Fi, endpoints, mobiles…

With the introduction of Sophos Wireless v2.0 and the new APX Series Access…


Logpoint. Why anti-virus alone can’t stop cryptocurrency mining

Cryptocurrencies like Bitcoin have been a source of worry since their creation.…


Sophos XG Architect Training (October 29-31, 2018)

This three-day training program was designed and intended for experienced…


Sophos gets top marks in CRN’s 2018 Annual Report Card

At Sophos, we believe in being “channel best,” which is why we’re proud to…


Take a tour of Sophos Central’s Endpoint and Intercept X Protection

There are numerous things you can do with Sophos Central, our cloud-based…


CyberArk Launches SAP-certified Privileged Access Security Solution

CyberArk, the global leader in privileged access security, today announced the…


Phish Threat’s security awareness training gets animated

Real-life cyber threat headlines, Hollywood scripts and great animations come…


Privileged Access Security for Dummies: A Practical, "How-To" Guide from CyberArk

Savvy security practitioners understand that one of the most important,…


How to make the most of your Sophos Endpoint

Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as…


Sophos. What is… cryptojacking?

To understand what cryptojacking is, you first need to understand……


Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise…


Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner…


The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key…


CyberArk. WannaBe Ready for the Next WannaCry?

We recently passed the one year anniversary NotPetya – one of the most…


Sophos placed as a leader in the latest Forrester Endpoint Wave

Sophos has been named a “leader” in the Forrester Wave: Endpoint…


Boldon James: "Out-of-the-box" Data Classification

Driving data security awareness to transform security culture Data…


CyberArk launches new Privileged Access Security as a Service offering

CyberArk, the global leader in privileged access security, today announced the…


Get the most from your XG Firewall

The new XG Firewall support page and XG Firewall how-to library are packed…