Our Blog
HelpSystems. Enterprise Data Security: Why It Matters and How To Build a Strategy
Before trying to better understand what enterprise data security is, it’s best to know the…
10 minutes read
Datto. Defending Against Data Loss: Choose the Reliable Solution
When a large-scale data loss recently occurred at a backup provider, it shined a new…
8 minutes read
BeyondTrust. One-Time Password (OTP) Solutions for Privileged Access
What are one-time passwords? A one-time password (OTP) is the password used in a credential…
5 minutes read
HelpSystems. Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs
It’s not news that cybercrime is a constant battle—large enterprises and small businesses everywhere are…
6 minutes read
Core Impact Introduces Ransomware Simulation
Once upon a time, it was often necessary to define the term “ransomware” as it…
4 minutes read
Core Security by HelpSystems. 4 Steps to Take Following a Pen Test
Congratulations! You’ve just completed a penetration test. So what now? A pen test shouldn’t represent…
6 minutes read
Introducing Sophos Cloud Native Security
Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within…
3 minutes read
Sophos. What is zero trust and why is ZTNA so important?
Trust is a dangerous word in IT, especially when that trust is granted without much…
2 minutes read
Sophos ZTNA receives Global New Product Innovation Award from Frost & Sullivan
Sophos ZTNA has received Frost & Sullivan’s prestigious Global New Product Innovation Award in the…
2 minutes read
Sophos Firewall OS v19 MR1 is now available
Sophos Firewall OS v19 MR1 brings a number of additional enhancements and fixes to what…
4 minutes read