AV-Test results show Sophos beats Kaspersky, Trend, McAfee and Symantec in stopping Mac malware
For the first time, AV-Test has released test results comparing malware…
NSA secretly funding code-breaking quantum computer research
Quantum computing hinges, very broadly, on allowing individual bits (called…
Opera breached, has code cert stolen, possibly spreads malware - advice on what to do
"On June 19th we uncovered, halted and contained a targeted attack on our…
Windows XP retirement: Using Sophos products to secure XP
So here are some tips on how you can use Sophos products to maintain security…
New Peplink Balance 2500 router and Updated Technology Pages
Learn How Balance and MAX Routers Team Up for Unbreakable VPNs The Balance…
Sophos honoured with Partnership Award from Queensland Police Service
Steve Gollschewski, Deputy Commissioner, Strategy, Policy and Performance…
Sophos Email Appliance offers Enhanced Phishing Protection
Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both…
Power & Environmental Monitoring for Data Centre Racks
iMeter can monitor up to 496 of the following sensors from a single IP……
Sophos Appoints Dan Schiappa General Manager of End User Security Group
At RSA, Schiappa managed a business unit with annual revenue over $500M, and he…
Sophos Offers Industry-First Hourly Pricing Model for UTM to Customers via AWS
Sophos currently offers an optimized AMI that is compatible with AWS cloud…
SophosLabs: Android malware intercepts SMS messages to steal banking info
One of our SophosLabs researchers, Anna Szalay, made an interesting discovery…
Sophos announces the availability of the new Sophos SG Series hardware appliances
“The new Sophos SG Series appliances are the fastest UTM and Next-Gen…
Apple iCloud - 3 tips for keeping your photos and other data safe
Of course, it isn’t just film stars who have sensitive data on their…
As encryption standards tighten, Array retools ADC, eyes SaaS clients
Service providers need higher level of encryption support "If you look at one…
Jacarta interSeptor systems accommodate a variety of optional sensors. Have you thought of water leaks;
Once these are exceeded interSeptor will provide an alert. For other sensors…
Watch where you plug in, folks - researchers hack iPhones with a charger
This is according to the abstract of a briefing to be given at the upcoming…
Announcing Sophos Antivirus for vShield v1.1
The new version includes the following improvements. New wizards for…
Multinational operation busts Windows botnet that infected half a million PCs
Authorities have apparently taken control of the Gameover bots and seized its…
Array Networks Ranked Second in Market Share in India for Application Delivery Networking
In comments that support Array’s ranking in the new report, IDC analysts…
GlobalSign: Biometric Technology Could Mean More Secure Enterprise Data
But what are the implications of biometric technology as far as…
How to deliver enterprise security for your SMB
And, as an IT professional, I faced the same challenge in all of these roles:…
Mike Valentine Named a Top IT Mid-Market Executive by CRN
This list was conceived to put a spotlight on the professionals driving one of…
$80 million yacht hijacked by students spoofing GPS signals
But those signals were not authentic, and the ship was not on course. The…
Sophos Acquires Cyberoam Technologies
“Sophos and Cyberoam create a winning combination at the right time, in…
New Sophos SG Series appliances beat the competition
In our recent UTM 9.2 release we accelerated our Intrusion Prevention System…
Sophos announces immediate support for iOS 8 in mobility management products Sophos Mobile Control and Sophos Cloud Mobile
And we’ve been named a Visionary in the Gartner Magic Quadrant for…
Interview: Ralf Haubrich, Vice President Sophos CEEMEA
Where are business most likely to be vulnerable and how this can be fixed with…
Facebook pays $20K for easily exploitable flaw that could have led to account hijackings
As it is, Whitten explains, Facebook gives users the option of linking their…
How to manage native encryption on Macs and Windows PCs
Unfortunately, these companies don’t provide complete end-to-end…