Autotask PSA Updates Enhance User Experience and Document Management

Autotask PSA is designed to drive efficiency, accountability, and the…


Datto. What is RMM Software and Why Do MSPs Need It?

RMM stands for “remote monitoring and management.” Remote monitoring and…


BeyondTrust. Securing the Next Wave of Work

After the 2020 pandemic tipped our traditional way of work on its head,…


Sophos XDR: Driven by data

When we set out to build our extended detection and response (XDR) solution, we…


Sophos. Introducing Sophos XDR and enhanced EDR

We are pleased to announce some exciting product updates, including the launch…


BeyondTrust. Rethinking Remote Access Security: Can Zero Trust Replace VPNs?

VPNs have their place, but that scope is getting smaller and smaller. Zero…


Sophos is a Leader in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms

We are thrilled to announce that for the 12th consecutive report, Sophos has…


Acunetix. What is the "target knowledge base"?

With the latest update to Acunetix, we introduced a new feature called the…


Sophos Intercept X ranks first in three new SE Labs reports

Intercept X ranked #1 with a 100% total accuracy rating for enterprise, SMB,…


BeyondTrust. Ransomware is Increasing & Evolving – How Do We Keep Up?

Ransomware surged in 2020 and shows no signs of relenting thus far in 2021. As…


Sophos. The State of Ransomware 2021

The State of Ransomware 2021 report provides fresh new insights into the…


Acunetix Web Application Vulnerability Report 2021- Most Common Security Vulnerabilities

Every year, Acunetix brings you an analysis of the most common web security…


Introducing Sophos Firewall and the new XGS Series hardware

Sophos launched the first of the new XGS Series next-gen firewall appliances…


Boldon James. What is Data Security?

What is Data Security? Generally, data security is described as all…


Sophos Central Architect Training (May 11th-13th, 2021)

This course provides an in-depth study of Sophos Central, designed for…


Acunetix. Benefits of Web Asset Discovery

The latest release of Acunetix introduces web asset discovery – a mechanism…


New features in the Sophos XG Firewall v18 MR5 release

Every maintenance release (MR) for XG Firewall v18 brings compelling new…


Sophos. Cloud? On prem? Protect your resources, wherever they’re held

Depending on your organization’s needs, you may be running servers on-premises,…


Zero Trust: New Name, New Tech for a Classic Security Approach

"Back when I was a contract firewall installer for Trusted Information Systems,…


BeyondTrust: More than half of Microsoft vulnerabilities solved by removing admin rights

More than half of Microsoft vulnerabilities could be solved by removing admin…


Datto RMM Ransomware Detection: Tried and Tested by MRG Effitas

Back in December, Datto introduced Ransomware Detection for Datto RMM. This…


Sophos. How to secure any device, anywhere

Last year, an astounding 51% of organizations were hit by ransomware, with…


What are Data Security Solutions and How do They Work?

Data is one of the valuable commodities shared by all organizations regardless…


DearCry. What it is and how to stop it

DearCry is a new ransomware variant that exploits the same vulnerabilities in…


Sophos. Remote workforce? Offer secure connectivity from any location

There’s no argument that the pandemic has driven a massive increase in remote…


Protecting Sophos customers from HAFNIUM

Sophos customers are protected from the exploitation of the new zero-day…


Acunetix. Vulnerability Scanning Tools – Why Not Open-Source?

With the immense popularity of open-source software such as Linux, WordPress,…


Sophos UTM Administrator Course (6-7 April, 2021)

This course is designed for technical professionals who will be administering…


Sophos to provide Intercept X for Qualcomm Snapdragon compute platforms

We’re pleased to announce that Sophos will provide Intercept X endpoint…