Our Blog
Sophos. On cybersecurity product testing
The testing of cybersecurity products is a contentious subject, with vendors and test organizations striving…
4 minutes read
Boldon James. In Terms Of Main Threat Actors, Expectation Rarely Matches Reality
Netwrix conducted a study of the major IT risks that are significant for most organizations…
2 minutes read
Boldon James. The Power of Two: Secure Messaging in a Modern Defence Environment
Defence organisations encompass two very different communication environments. Military messaging takes place within live operational…
4 minutes read
Sophos Mobile gets in sync with Google Cloud Identity
Onboarding new devices to management policy controls includes the important step of user authentication. That’s…
1 minute read
The best just got better. Intercept X now with EDR
We are very excited to announce the launch of Sophos Intercept X Advanced with EDR,…
3 minutes read
Boldon James: Data breach reports see 75% increase in last two years
Data breaches are up 75% in two years, finds a report from the Information Commissioner…
5 minutes read
Sophos recognized for anti-ransomware success at Channelnomics Awards
We are thrilled to announced that we’ve won the award for Best Anti-Ransomware Solution and…
2 minutes read
Sophos is named a Leader in the Gartner UTM Magic Quadrant
We’re very pleased to announce that for the 7th consecutive year, Gartner has named Sophos…
3 minutes read
Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part II)
Vulnerability Assessment Builds Security Continuous Improvement Into your Enterprise SDLC Vulnerability assessments are a highly…
10 minutes read
2018 NSS Labs NGFW retest results for XG Firewall
Sophos is committed to providing you with the best protection, performance and value in the…
2 minutes read