
Our Blog
BeyondTrust. 5 Use Cases for Reducing Unix & Linux Attack Surfaces and Achieving Compliance
The concept of least privilege roughly states that all users, applications, and processes should only…
11 minutes read
HelpSystems. Data Security Survey Reveals Organizations Are More Cybersecure Than a Year Ago, but Threats Are Growing
Security leaders have never faced such pressure to protect their organization’s data and reputation from…
6 minutes read
Sophos. Zero trust network access (ZTNA) versus remote access VPN
Remote access VPN has long served us well, but the recent increase in remote working…
9 minutes read
Datto Launches Two Continuity Solutions that Provide the Last Line of Defense for MSPs Against Cyberattacks
Datto, the leading global provider of security and cloud-based software solutions purpose-built for Managed Service…
4 minutes read
Invicti: 65% of cybersecurity professionals believe they’ve saved their companies $1M+ this year by preventing breaches
As breaches continue to rise, cybersecurity and development professionals are feeling the pressure to maintain…
3 minutes read
Sophos Named a Gartner Peer Insights Customers’ Choice for Network Firewalls
Customers have spoken, naming Sophos a Gartner® Peer Insights Customers’ Choice for Network Firewalls. Across…
4 minutes read
BeyondTrust. Zero Trust and Passwordless Authentication
Cybersecurity is not an industry that is synonymous with fashion. We have never had an…
4 minutes read
Sophos. The State of Ransomware 2022
Sophos recently released the State of Ransomware 2022, its annual study of the real-world ransomware…
5 minutes read
Sophos. Protect data backups from malicious attacks and theft
Backing up servers, workstations, and other devices is a best practice and business imperative, but…
7 minutes read
Sophos Acquires SOC.OS
We’re excited to share that Sophos has acquired SOC.OS, an innovative company based in the…
4 minutes read