Core Security. Balancing Internal and External Pen Testing
With the threat landscape expanding and criminals taking advantage of security gaps, organizations are turning…
6 minutes read
Core Security. The Role of In-House Penetration Testing
Security adviser Roger Grimes once famously wrote, “To beat hackers, you have to think like…
6 minutes read
Sophos. The State of Ransomware 2023
Sophos has released its annual State of Ransomware 2023 report, revealing deep insights into the…
5 minutes read
Sophos Endpoint earns perfect scores in SE Labs Q1 2023 endpoint protection report
We’re delighted to share that Sophos Intercept X Endpoint Protection ranked as the industry best…
3 minutes read
Keeper Security. Password Management is Critical to Your Cybersecurity Strategy
From generating strong passwords to monitoring the security policies and practices of a company, password…
5 minutes read
Keeper Security. How Secure Are Password Managers?
Most password managers are very secure and safe to use. Depending on the password manager…
6 minutes read
Terranova. 9 Examples of Social Engineering Attacks
All examples of social engineering take advantage of human nature, such as the willingness to…
10 minutes read
Sophos Intercept X with XDR recognized as the #1 XDR solution by G2 users
Sophos Intercept X with Extended Detection and Response (XDR) has been rated the #1 XDR…
3 minutes read