Our Blog
Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security
The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider…
2 minutes read
Boldon James. What Financial Services Executives Need To Know About Data Security
The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the…
4 minutes read
Logpoint. Did you have coffee with a hacker this morning?
Your organization likely spends resources in preventing external breaches and taking the necessary measures to…
6 minutes read
Boldon James. Bridging The Chasm Between Security And Data Management
The primary reason most organisations look at classifying the data they create and handle is…
4 minutes read
See the future of cybersecurity with the new version of Sophos Home
The new version of Sophos Home brings business-grade cybersecurity to your home. New features added…
2 minutes read
Sophos Acquires DarkBytes as Foundation of New MDR Services
Sophos, a global leader in network and endpoint security, today announced that it has acquired…
3 minutes read
Boldon James. True Data Privacy Cannot Exist Without Addressing The Insider Threat
Protecting sensitive customer data is a huge priority for today’s organizations, which face intensifying regulatory…
7 minutes read
Stopping Emotet with Sophos
The US Department for Homeland Security considers Emotet to be one of the most costly…
10 minutes read
CyberArk. The CISO View on DevOps: New Report Highlights Approaches to Reduce Cyber Security Risk
CyberArk, the global leader in privileged access security, today issued a new research report, “The CISO…
4 minutes read
XG Firewall and Lateral Movement Protection
Sophos XG Firewall and Synchronized Security continue to innovate and push the envelope of what’s…
5 minutes read