Five Reasons Why It’s Time to Put Privilege First
For more than a decade, CyberArk has focused on helping companies to protect high value…
3 minutes read
Sophos Home – Free Protection for Your Personal Devices
How do things stand with you in terms of protection for personal PCs and Macs?…
1 minute read
Introducing Sophos Intercept X – a completely new approach to endpoint security
At Sophos, we’re no strangers to next-generation security. You can see it across our entire…
4 minutes read
Ways IoT Exposes Organizations to Risk
Just like the visible stars in any night sky, the number of IoT devices may…
4 minutes read
Sophos Mobile Control offers same-day iOS 10 compatibility
Apple has made iOS 10 available and will push upgrade notifications out to devices over…
1 minute read
New SophosLabs research: Cryptomining malware on NAS servers worldwide
SophosLabs has just released a research paper on a new way that cybercriminals are distributing…
1 minute read
Sophos is a Magic Quadrant Leader in Unified Threat Management for the fifth year running
We’re excited to announce that the new Gartner Magic Quadrant for Unified Threat Management* is…
2 minutes read
Cisco vulnerability shows up in attack tools leaked by “NSA hackers”
The Shadow Brokers are a self-styled hacker group that recently kicked off a tongue-in-cheek media…
6 minutes read
Cisco vuln shows up in attack tools leaked by “NSA hackers”
The Shadow Brokers are a self-styled hacker group that recently kicked off a tongue-in-cheek media…
6 minutes read
Corero: Choose Your Network Threat Defenses Wisely
Being an IT security professional isn’t easy these days; the cyber threat landscape is constantly…
3 minutes read