Core Security by HelpSystems. 4 Steps to Take Following a Pen Test

Congratulations! You’ve just completed a penetration test. So what now? A pen test shouldn’t represent…

Published August 16, 2022
6 minutes read

Introducing Sophos Cloud Native Security

Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within…

Published August 11, 2022
3 minutes read

Sophos. What is zero trust and why is ZTNA so important?

Trust is a dangerous word in IT, especially when that trust is granted without much…

Published August 9, 2022
2 minutes read

Sophos ZTNA receives Global New Product Innovation Award from Frost & Sullivan

Sophos ZTNA has received Frost & Sullivan’s prestigious Global New Product Innovation Award in the…

Published August 4, 2022
2 minutes read

Sophos Firewall OS v19 MR1 is now available

Sophos Firewall OS v19 MR1 brings a number of additional enhancements and fixes to what…

Published August 2, 2022
4 minutes read

HelpSystems. Celebrating 10 Years of Cobalt Strike

Can you believe it? Cobalt Strike is 10 years old! Think back to the summer…

Published July 28, 2022
2 minutes read

HelpSystems | TLS for Email: What is It and how to check if an email uses it

TLS is a popular Internet security protocol designed to establish secure communications that provides both…

Published July 26, 2022
6 minutes read

Sophos Managed Threat Response: 10,000 customers and counting!

Organizations are rapidly switching to Sophos’ managed detection and response service to enjoy better cybersecurity…

Published July 21, 2022
4 minutes read

HelpSystems. Modern Data Security for the Enterprise

How companies can layer security solutions to ensure their data is fully protected no matter…

Published July 19, 2022
6 minutes read

Datto. How to protect endpoints with a multi-layer security strategy

Malware and ransomware infection rates are increasing year-over-year, with ransomware attacks doubling in 2021 according…

Published July 13, 2022
7 minutes read