
Posts In:
Sophos. Searching for malicious PowerShell executions with Intercept X
Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not malicious, but PowerShell…
2 minutes read
Sophos. SD-WAN and XG Firewall
Few terms in networking have generated as much buzz recently as SD-WAN (or Software Defined…
5 minutes read
9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk
NSS together with CyberArk and Sophos will inform you of the latest cyber threats and…
4 minutes read
How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks
Earlier this week, news broke that a Chinese woman attempted to sneak a USB stick…
2 minutes read
Making the most of your Sophos XG Firewall
XG Firewall v17.5 recently delivered several new innovations including Lateral Movement Protection, management via Sophos…
4 minutes read
CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation
The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream….
4 minutes read