Our Blog
Sophos Report: Endpoint Protection Best Practices to Block Ransomware
Read the report today! In our recent survey of 5,000 IT Managers across 26 countries,…
4 minutes read
Find open RDP sessions using Sophos Live Discover
Remote Desktop Protocol (RDP), while a legitimate tool, is also a common ingress point for…
2 minutes read
New Sophos Support Portal now available
We’re excited to announce that we have launched the new Sophos Support Portal, which makes…
3 minutes read
How Netsparker Finds Vulnerabilities
We often get asked about the inner workings of Netsparker’s vulnerability scanning engine. People familiar…
6 minutes read
Sophos Report: The State of Cloud Security 2020
As cybercriminals continue to take advantage of the public cloud in their attacks, Sophos commissioned…
4 minutes read
Sophos. Stop ProLock ransomware with three layers of protection from Intercept X
ProLock ransomware emerged on the threat scene in March, a retooled and rebranded version of…
3 minutes read
Sophos. Extend visibility across your entire cloud environment
We are excited to announce that Intercept X for Server Advanced with EDR has been…
4 minutes read
BeyondTrust. Secure Every Privilege, Every Time
Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal…
2 minutes read
Sophos. Full-disk encryption is the first line of defense
Increased remote working makes it more important than ever to secure computers and the data…
3 minutes read
BeyondTrust. Remote Access, Cloud Adoption and Digital Transformation are Accelerating: PAM is the Key to Secure and Enable It
Work from home (WFH) and remote access have accelerated the digital transformation journey, and IT’s…
8 minutes read