Sophos named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms… again

For the 11th time in the last 11 reports, Sophos has been named a Leader…

Published August 27, 2019
2 minutes read

Boldon James. The 5 Steps to Effective Data Classification: Classify

A corporate data security policy that sets out how valuable information should be handled will…

Published August 21, 2019
5 minutes read

Boldon James. The 5 Steps to Effective Data Classification: Discover

By classifying data according to its value or sensitivity, organisations can reduce the risk of…

Published August 21, 2019
3 minutes read

Boldon James. The 5 Steps to Effective Data Classification: Identify

Using data classification as part of a strategy to secure corporate data assets is sometimes…

Published August 21, 2019
3 minutes read

Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data

Despite the past year’s global focus on GDPR and other data privacy regulations designed to give consumers…

Published August 12, 2019
4 minutes read

Sophos. Would you fall for a BEC attack?

Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit by…

Published August 12, 2019
3 minutes read

Sophos. The security of machine learning

Artificial intelligence and machine learning are persistently in the headlines with rich debate over its…

Published August 12, 2019
6 minutes read

CyberArk Docs: Privileged Access Security Documentation for All

Not long ago on the CyberArk Conjur blog, our DevOps community manager and evangelist John…

Published July 31, 2019
3 minutes read

Sophos. 3 reasons attackers love your servers

37% of cyberattacks are discovered on servers, making them the most likely place to identify…

Published July 29, 2019
3 minutes read

CyberArk. Where Security Accountability Stops and Starts in the Public Cloud

For years, security was cited as a prime reason not to put sensitive data or…

Published July 27, 2019
3 minutes read