Core Security. Balancing Internal and External Pen Testing

With the threat landscape expanding and criminals taking advantage of security gaps, organizations are turning…

Published May 29, 2023
6 minutes read

Core Security. The Role of In-House Penetration Testing

Security adviser Roger Grimes once famously wrote, “To beat hackers, you have to think like…

Published May 23, 2023
6 minutes read

Sophos. The State of Ransomware 2023

Sophos has released its annual State of Ransomware 2023 report, revealing deep insights into the…

Published May 18, 2023
5 minutes read

Sophos Endpoint earns perfect scores in SE Labs Q1 2023 endpoint protection report

We’re delighted to share that Sophos Intercept X Endpoint Protection ranked as the industry best…

Published May 16, 2023
3 minutes read

Keeper Security. Password Management is Critical to Your Cybersecurity Strategy

From generating strong passwords to monitoring the security policies and practices of a company, password…

Published May 11, 2023
5 minutes read

Keeper Security. How Secure Are Password Managers?

Most password managers are very secure and safe to use. Depending on the password manager…

Published May 8, 2023
6 minutes read

Terranova. 9 Examples of Social Engineering Attacks

All examples of social engineering take advantage of human nature, such as the willingness to…

Published May 4, 2023
10 minutes read

Sophos Intercept X with XDR recognized as the #1 XDR solution by G2 users

Sophos Intercept X with Extended Detection and Response (XDR) has been rated the #1 XDR…

Published May 2, 2023
3 minutes read