Our Blog
Sophos Central Architect Training (May 11th-13th, 2021)
This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who…
8 minutes read
Acunetix. Benefits of Web Asset Discovery
The latest release of Acunetix introduces web asset discovery – a mechanism that automatically lets…
5 minutes read
New features in the Sophos XG Firewall v18 MR5 release
Every maintenance release (MR) for XG Firewall v18 brings compelling new features, including a variety…
4 minutes read
Sophos. Cloud? On prem? Protect your resources, wherever they’re held
Depending on your organization’s needs, you may be running servers on-premises, consuming cloud-based applications, or…
5 minutes read
Zero Trust: New Name, New Tech for a Classic Security Approach
“Back when I was a contract firewall installer for Trusted Information Systems, we had a…
5 minutes read
BeyondTrust: More than half of Microsoft vulnerabilities solved by removing admin rights
More than half of Microsoft vulnerabilities could be solved by removing admin rights, according to…
2 minutes read
Datto RMM Ransomware Detection: Tried and Tested by MRG Effitas
Back in December, Datto introduced Ransomware Detection for Datto RMM. This native capability within Datto…
2 minutes read
Sophos. How to secure any device, anywhere
Last year, an astounding 51% of organizations were hit by ransomware, with attackers succeeding in…
4 minutes read
What are Data Security Solutions and How do They Work?
Data is one of the valuable commodities shared by all organizations regardless of size, location,…
8 minutes read
DearCry. What it is and how to stop it
DearCry is a new ransomware variant that exploits the same vulnerabilities in Micosoft Exchange as…
2 minutes read