Sophos. Check out this infographic showing the history of mobile threats, 2004-2015

It’s been about a decade since we began seeing threats to mobile devices,…


Corero. Black Hole Routing – Not a Silver Bullet for DDoS Protection

As ISPs, Hosting Providers and Online Enterprises around the world continue…


Sophos. Do these 3 things to help your family and friends stay secure

Are you the unofficial IT support person for your friends and family? If you…


Sophos Web Appliance v4.0 release news

Just over a month ago we announced the release of version 4.0 of the Sophos Web…


Sophos. Which countries top the new Dirty Dozen spam list?

SophosLabs tracks huge volumes of spam from around the world, and once in a…


Array. Which is King? The Network or the Applications?

Back in the day, network speed and throughput were limiting factors for the…


Why choose Sophos Endpoint Protection? Flexible deployment

Sophos makes enterprise-grade security that works for small and mid-sized…


Would you mail your confidential business plans on a postcard?

As much as we complain about email as an annoyance, a distraction, and a…


5 great new things in Sophos Mobile Control 5

Sophos announced the availability of Sophos Mobile Control 5, which…


Sophos announced Sophos Mobile Control 5

Sophos announced the availability of Sophos Mobile Control 5 (SMC 5), to…


Sophos. Who will cybercriminals target next?

Who will cybercriminals target next? James Lyne, Sophos global head of security…


Array. SSL VPNs: Alive and Well, and Vital to IT Security

There’s been a bit of buzz in the normally sedate SSL VPN market lately,…


Sophos. World Backup Day - why backups are so important, and some data protection tips for businesses

Every day businesses are creating and accumulating data they need to protect…


Corero. DDoS - whose responsibility is it?

As organizations around the globe become more-and-more reliant on the Internet,…


Corero. Are DDoS attacks getting bigger or smaller?

There has been a flurry of DDoS reports from DDoS protection vendors as of…


Array. WAN Optimization is the "Secret Sauce" behind Network/Application Performance

Late last week industry analyst firm MarketsandMarkets issued a new report…


Why choose Sophos Endpoint Protection? User-based licensing

More and more people are using multiple devices — a laptop for the…


Sophos. Unsecure Wi-Fi - are you guilty of this “Deadly IT Sin”?

Recently we focused on the threat of unprotected Wi-Fi networks to…


Why choose Sophos Endpoint Protection? Sophisticated simplicity

“Sophisticated simplicity” sounds like a bit of a paradox. How can…


Sophos: That free open Wi-Fi could cost you your identity

Our Always on the go, but need to stay connected? It might be tempting to log…


Building a BYOD Policy? Use SSL VPN as a Strong Foundation

According to ComputerWeekly’s 2015 IT Priorities Report, 46% of IT…


Corero: Industry Observations of DDoS Trends

Observing and analyzing DDoS attacks over a period of time helps us all…


Are you protecting your Macs? See how to avoid “Mac malice” and other IT sins

Macs are gaining ground on PCs everywhere, including at the office. Companies…


Why choose Sophos Endpoint Protection? Lightning performance that won’t slow users down

Our customers rely on us for innovative protection against today’s…


Sophos Web Appliance v4 available end of March

Τhe easiest Secure Web Gateway with the best protection is getting a…


Sophos at Mobile World Congress: Hacking mobile devices and the Internet of Things

The security of mobile devices and the Internet of Things is surprisingly lax,…


Why choose Sophos Endpoint Protection? Our innovative technology and threat intelligence

Today’s endpoint protection needs to do much more than blocking known…