Our Blog
How Intercept X Advanced can help you avoid becoming a ransomware victim
Tourists aren’t the only ones looking at Florida this summer. As the Sunshine State ramps…
2 minutes read
More fantastic test results for Sophos Intercept X
Sophos Intercept X continues to perform well in third party tests, and we thought we’d…
2 minutes read
Sophos Mobile Security earns full marks in AV-Test Android malware review
Since September 2014 (that makes 29 tests in a row!), Sophos Mobile Security has achieved…
1 minute read
Calling all developers – SophosLabs APIs are here!
At Sophos, we appreciate how hard it is to solve security problems when developing applications…
3 minutes read
Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address
Cybercriminals are becoming increasingly proficient at infiltrating enterprises to steal data for profit, acquire intellectual…
1 minute read
CyberArk Introduces Privileged Access Security Assessment Tool
Privileged access security is a key pillar of an effective security program. We take our…
5 minutes read
Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy
As Shep Hyken recently noted, personalization continues to become more personal in the customer service field….
7 minutes read
Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe
Cybersecurity isn’t getting any easier. To better understand the day-to-day reality for IT teams we…
2 minutes read
BlueKeep: firewall best practices from Sophos
CVE-2019-07-08, nicknamed BlueKeep, is a critical remote code execution vulnerability in Windows’ Remote Desktop Services….
4 minutes read
Sophos has acquired MDR specialists Rook Security
Cybercriminals are resourceful, organized and relentless, and businesses need 24/7 monitoring and management of their…
2 minutes read