Our Blog
Phish Threat’s security awareness training gets animated
Real-life cyber threat headlines, Hollywood scripts and great animations come to Phish Threat. “I’ll admit…
2 minutes read
Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk
Savvy security practitioners understand that one of the most important, preventative steps they can take…
2 minutes read
Sophos. What is… cryptojacking?
To understand what cryptojacking is, you first need to understand cryptomining. Cryptomining is a lot…
1 minute read
How to make the most of your Sophos Endpoint
Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as my seven-year old…
2 minutes read
Sophos ranks #1 for endpoint protection by SE Labs
Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small…
2 minutes read
Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant
Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner Magic Quadrant…
1 minute read
The 5 W’s of Data Identification and Inventory
Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when…
4 minutes read
CyberArk. WannaBe Ready for the Next WannaCry?
We recently passed the one year anniversary NotPetya – one of the most devastating outbreaks…
4 minutes read
Sophos placed as a leader in the latest Forrester Endpoint Wave
Sophos has been named a “leader” in the Forrester Wave: Endpoint Security Suites, Q2 2018….
1 minute read
Boldon James: “Out-of-the-box” Data Classification
Driving data security awareness to transform security culture Data classification is a key component of…
3 minutes read