Five Reasons Why It’s Time to Put Privilege First

For more than a decade, CyberArk has focused on helping companies to protect high value…

Published September 30, 2016
3 minutes read

Sophos Home – Free Protection for Your Personal Devices

How do things stand with you in terms of protection for personal PCs and Macs?…

Published September 27, 2016
1 minute read

Introducing Sophos Intercept X – a completely new approach to endpoint security

At Sophos, we’re no strangers to next-generation security. You can see it across our entire…

Published September 22, 2016
4 minutes read

Ways IoT Exposes Organizations to Risk

Just like the visible stars in any night sky, the number of IoT devices may…

Published September 20, 2016
4 minutes read

Sophos Mobile Control offers same-day iOS 10 compatibility

Apple has made iOS 10 available and will push upgrade notifications out to devices over…

Published September 17, 2016
1 minute read

New SophosLabs research: Cryptomining malware on NAS servers worldwide

SophosLabs has just released a research paper on a new way that cybercriminals are distributing…

Published September 16, 2016
1 minute read

Sophos is a Magic Quadrant Leader in Unified Threat Management for the fifth year running

We’re excited to announce that the new Gartner Magic Quadrant for Unified Threat Management* is…

Published September 15, 2016
2 minutes read

Cisco vulnerability shows up in attack tools leaked by “NSA hackers”

The Shadow Brokers are a self-styled hacker group that recently kicked off a tongue-in-cheek media…

Published September 13, 2016
6 minutes read

Cisco vuln shows up in attack tools leaked by “NSA hackers”

The Shadow Brokers are a self-styled hacker group that recently kicked off a tongue-in-cheek media…

Published September 8, 2016
6 minutes read

Corero: Choose Your Network Threat Defenses Wisely

Being an IT security professional isn’t easy these days; the cyber threat landscape is constantly…

Published September 6, 2016
3 minutes read