Sophos Central Architect Training (May 11th-13th, 2021)

This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who…

Published April 16, 2021
8 minutes read

Acunetix. Benefits of Web Asset Discovery

The latest release of Acunetix introduces web asset discovery – a mechanism that automatically lets…

Published April 15, 2021
5 minutes read

New features in the Sophos XG Firewall v18 MR5 release

Every maintenance release (MR) for XG Firewall v18 brings compelling new features, including a variety…

Published April 13, 2021
4 minutes read

Sophos. Cloud? On prem? Protect your resources, wherever they’re held

Depending on your organization’s needs, you may be running servers on-premises, consuming cloud-based applications, or…

Published April 8, 2021
5 minutes read

Zero Trust: New Name, New Tech for a Classic Security Approach

“Back when I was a contract firewall installer for Trusted Information Systems, we had a…

Published April 6, 2021
5 minutes read

BeyondTrust: More than half of Microsoft vulnerabilities solved by removing admin rights

More than half of Microsoft vulnerabilities could be solved by removing admin rights, according to…

Published April 2, 2021
2 minutes read

Datto RMM Ransomware Detection: Tried and Tested by MRG Effitas

Back in December, Datto introduced Ransomware Detection for Datto RMM. This native capability within Datto…

Published March 31, 2021
2 minutes read

Sophos. How to secure any device, anywhere

Last year, an astounding 51% of organizations were hit by ransomware, with attackers succeeding in…

Published March 24, 2021
4 minutes read

What are Data Security Solutions and How do They Work?

Data is one of the valuable commodities shared by all organizations regardless of size, location,…

Published March 22, 2021
8 minutes read

DearCry. What it is and how to stop it

DearCry is a new ransomware variant that exploits the same vulnerabilities in Micosoft Exchange as…

Published March 19, 2021
2 minutes read