Phish Threat’s security awareness training gets animated

Real-life cyber threat headlines, Hollywood scripts and great animations come to Phish Threat. “I’ll admit…

Published August 23, 2018
2 minutes read

Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk

Savvy security practitioners understand that one of the most important, preventative steps they can take…

Published August 21, 2018
2 minutes read

Sophos. What is… cryptojacking?

To understand what cryptojacking is, you first need to understand cryptomining. Cryptomining is a lot…

Published August 21, 2018
1 minute read

How to make the most of your Sophos Endpoint

Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as my seven-year old…

Published August 20, 2018
2 minutes read

Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small…

Published August 6, 2018
2 minutes read

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner Magic Quadrant…

Published August 1, 2018
1 minute read

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when…

Published July 30, 2018
4 minutes read

CyberArk. WannaBe Ready for the Next WannaCry?

We recently passed the one year anniversary NotPetya – one of the most devastating outbreaks…

Published July 16, 2018
4 minutes read

Sophos placed as a leader in the latest Forrester Endpoint Wave

Sophos has been named a “leader” in the Forrester Wave: Endpoint Security Suites, Q2 2018….

Published July 16, 2018
1 minute read

Boldon James: “Out-of-the-box” Data Classification

Driving data security awareness to transform security culture Data classification is a key component of…

Published July 13, 2018
3 minutes read