Sophos Acquires SOC.OS
We're excited to share that Sophos has acquired SOC.OS, an innovative company…
Intercept X and Sophos Home get perfect scores in three SE Labs endpoint protection tests
We’re thrilled to announce that Intercept X scored 100% Total Accuracy ratings…
HelpSystems. Secure data sharing solves three cybersecurity challenges
When searching for security solutions for your organization, it may be easy to…
Datto. What Is SaaS Protection (Software as a Service)? (Part 2)
Datto. What Is SaaS Protection (Software as a Service)? (Part 2) Why the SaaS…
HelpSystems. Keeping Cloud Security Top Priority in Your Digital Transformation
Times are changing—employees are working from home, using more devices, and…
Datto. What Is SaaS Defense (Software as a Service)? (Part 1)
Datto. What Is SaaS Defense (Software as a Service)? (Part 1)SaaS stands for…
Sophos. Understanding data backups
There is a maxim in the business continuity market that says that a backup on…
HelpSystems. New Data Security Strategies for 2022
3 Data Centric Security Strategies for 2022 Despite massive growth in data…
BeyondTrust. Managing Shared Accounts for Privileged Users: 5 Best Practices for Achieving Control and Accountability
Many IT organizations use shared accounts for privileged users, administrators,…
Sophos. ZTNA strengthens security controls for remote workers
Remote access has been a component of the network since the days of acoustic,…
Sophos Firewall OS v18.5 MR3 is Now Available
The product team is pleased to announce the latest maintenance release update…
Datto. Top 20 Most Common Hacker Behaviors
When the OWASP Top 20 Vulnerabilities was first published it revolutionized our…
SEP sesam Jaglion. Strong. Elegant. Adaptable
SEP sesam version Jaglion - the hybrid of jaguar and lion symbolises the…
Datto. Conti Ransomware - How it Works and 4 Ways to Protect Yourself
What is Conti Ransomware? Conti is a ransomware-as-a-service (RaaS) affiliate…
Sophos. Optimizing Breach Prevention: Stop Them Before They Get In
In sports, there is a saying that if the opponent cannot score, they cannot…
Array. Top 5 Web Application Security Practices That Can Save You from Attacks in 2022
On May 7, 2021, the largest oil pipeline system in the US suffered a major…
Sophos. Five Tips to Better Protect Yourself During the Current Russia-Ukraine Crisis
The current Russia-Ukraine crisis is unprecedented. One aspect of the current…
Why Sophos ZTNA is better
Sophos ZTNA provides a number of advantages over remote-access VPN – enabling…
The New Normal in Cybersecurity: Exploring the Top Three 2022 Predictions (Part 2)
In The New Normal in Cybersecurity Part 1, we examined three leading trends in…
The New Normal in Cybersecurity: Examining the Top Three 2021 Trends (Part 1)
Τhe past year has shown organizations that uncertainty and a transformed…
Sophos XDR: Enhanced Investigations and Office 365 Integration
We are pleased to announce exciting enhancements to the Investigations…
HelpSystems. 4 Ways to Use SIEM for SMB
Security Information and Event Management (SIEM) solutions are often seen as a…
Sophos recognized on CRN’s Cloud 100 list for 2022
At Sophos, we’re committed to helping organizations secure essential resources…
Sophos. Ransomware attacks drive ZTNA adoption
A study of 5,400 IT professionals has revealed a correlation between direct…
Archiving Microsoft 365 Emails for New MailStore Server Customers
We created our blog series Tech Tips to familiarize all interested parties,…
HelpSystems. Choosing the Right Data Security Solution
In a world in which the data threat landscape is becoming bigger, stronger, and…
The most powerful parts of Sophos Central? The ones nobody notices
There's a lot of going on quietly in the background with Sophos Central, the…
BeyondTrust. Essential Cybersecurity Survival Strategies for 2022 & Beyond
In cyberspace, there exists no safe harbor. Every organization with a digital…
Multi-cloud threat detection and response with Sophos XDR
Sophos Extended Detection and Response (XDR) now goes even further in the…