Our Blog
Boldon James. How much does the average employee know about data privacy?
With the impacts and repercussions of the looming California Consumer Privacy Act (CCPA) on the…
4 minutes read
Boldon James. Enterprises Must Take Insider Threats More Seriously
Security teams need to consider the possibility of internal as well as external threats While…
8 minutes read
CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported
In May, it will be a year since the enforcement of the EU GDPR began….
6 minutes read
CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide
CyberArk is honored to be named a 5-Star Security Vendor – the highest rating in…
2 minutes read
Sophos. Searching for malicious PowerShell executions with Intercept X
Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not malicious, but PowerShell…
2 minutes read
Sophos. SD-WAN and XG Firewall
Few terms in networking have generated as much buzz recently as SD-WAN (or Software Defined…
5 minutes read
9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk
NSS together with CyberArk and Sophos will inform you of the latest cyber threats and…
4 minutes read
How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks
Earlier this week, news broke that a Chinese woman attempted to sneak a USB stick…
2 minutes read
Making the most of your Sophos XG Firewall
XG Firewall v17.5 recently delivered several new innovations including Lateral Movement Protection, management via Sophos…
4 minutes read
CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation
The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream….
4 minutes read