Email security just got much smarter

The predictive power of artificial intelligence is coming to your inbox. The…


XG Firewall v17.1. Shine a light on the shadows in your IT security

XG Firewall v17.1 has arrived, and with it comes visibility to the dark…


You will lose data…

You will lose data, if you haven’t already. That impact of that data loss…


Maximize your investments in Identity Governance and Privileged Access Security

Privileged access security is too often implemented independently from an…


Cybercriminals are after your servers too!

Your servers hold your most critical data, your business applications and your…


Sophos ranks #1 in exploit protection!

Exploits are the techniques that attackers use to gain access and control of…


Think Twice Before You Click to Save Credentials in a Web Browser

It’s increasingly common: attackers target credentials stored within web…


Sophos. Stop rolling your eyes at machine learning

When I speak about machine learning I know I run the risk of having half the…


GDPR is here – how Sophos protects your data

With the implementation of the EU General Data Protection Regulation (GDPR)…


GDPR: protect yourself from data theft

Organizations everywhere are preparing for the enforcement of the EU’s…


Small is beautiful: meet our new Sophos desktop firewall and UTM appliances

We recently launched the new generation of our award-winning XG and SG Series…


8 more reasons to try Sophos

At Sophos we try hard to keep our customers secure, safe and satisfied with…


The endpoint attack chain… simplified

A comprehensive, defense in depth strategy using layers of overlapping…


Your network firewall’s dirty secrets

"There are some things your firewall would rather you didn’t know". In…


Switching from SonicWall to Sophos just got even easier

If you’re planning a migration from SonicWall to XG Firewall, or at…


Data Breaches Are Real – Don’t Be Left Unprotected

2018 – The year of the GDPR, and still, data breaches are occurring at…


GDPR Is Here: Resources for Your Compliance Journey

After all the build-up, the GDPR deadline is officially here. From the…


Sophos Mobile 8.1: Now with Office 365 management

We are pleased to announce that Sophos Mobile 8.1 is now available. This new…


Synchronized App Control: making XG Firewall even more powerful

The apps on your network are eating up your bandwidth, and their unpatched…


CyberArk and AWS: Comprehensive Enterprise-Class Security Solutions for AWS Native, Hybrid and Multi-Cloud

Organizations of all sizes continue to adopt and accelerate their move to the…


Boldon James. Why One Size Does Not Fit All

These days we strive for simplicity, we look for the easiest, simplest, and at…


Ransomware isn’t going away and it’s not slowing down

Ransomware may still be wreaking havoc, but we’ve got everything you…


CyberArk. Bridging the Gap to Third Party Devices, Applications and Operating Systems

The overall strength of a privileged account security solution can be measured…


Boldon James. The people problem - security’s biggest blind spot

How organisations can turn their biggest security threat — people…


Proper Disaster Recovery Planning 2018

The backup and disaster recovery industry has seen plenty of changes over the…


What’s new in Intercept X?

Intercept X has taken the security world by storm. And it just keeps getting…


Sophos scores with Innovation in Technology award

We continue to be recognized for our groundbreaking, next-gen technology,…


CyberArk acquires Vaultive to advance privileged account security for the cloud

CyberArk, the global leader in privileged account security,  announced…


Intercept X: exploring deep learning

Deep learning is a powerful, groundbreaking tool for keeping unknown threats…