SophosLabs: Exploring the popularity and applications of document exploit builder Ancalog
Document exploitation is a well-known method of distributing malware in the malware community. A common…
2 minutes read
CyberArk: Why Privileged Account Security Must be a Top Priority
Make no mistake, your organization is a target – do you have an effective security…
2 minutes read
Sophos named a Leader in the Forrester Endpoint Wave 2016
Sophos today announced it has been positioned as a ‘Leader’ in Forrester Research, Inc.’s new…
3 minutes read
Sophos Web Appliance 4.3 with new Sandstorm features and more is available
We’re pleased to announce the latest release of Sophos Web Appliance 4.3, which adds improved…
3 minutes read
How Sophos helps our own employees to stay safe
Sophos is the same as any other business – we need to keep our employees…
5 minutes read
The new XG Firewall v16 has arrived
The firewall team has been working furiously over the last several months on the latest…
11 minutes read
XG Firewall v16 has arrived!
The firewall team has been working furiously over the last several months on the latest…
11 minutes read
CyberArk: Your Security Systems Need to be Secure
According to a variety of industry reports, cyber security spending is measured in Billions of…
2 minutes read
Encryption now available in Sophos Central
Cab rides, airport security, busy cafes, hotel rooms, airplanes; all can be very treacherous places…
2 minutes read