Our Blog
Sophos named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms… again
For the 11th time in the last 11 reports, Sophos has been named a Leader…
2 minutes read
Boldon James. The 5 Steps to Effective Data Classification: Classify
A corporate data security policy that sets out how valuable information should be handled will…
5 minutes read
Boldon James. The 5 Steps to Effective Data Classification: Discover
By classifying data according to its value or sensitivity, organisations can reduce the risk of…
3 minutes read
Boldon James. The 5 Steps to Effective Data Classification: Identify
Using data classification as part of a strategy to secure corporate data assets is sometimes…
3 minutes read
Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data
Despite the past year’s global focus on GDPR and other data privacy regulations designed to give consumers…
4 minutes read
Sophos. Would you fall for a BEC attack?
Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit by…
3 minutes read
Sophos. The security of machine learning
Artificial intelligence and machine learning are persistently in the headlines with rich debate over its…
6 minutes read
CyberArk Docs: Privileged Access Security Documentation for All
Not long ago on the CyberArk Conjur blog, our DevOps community manager and evangelist John…
3 minutes read
Sophos. 3 reasons attackers love your servers
37% of cyberattacks are discovered on servers, making them the most likely place to identify…
3 minutes read
CyberArk. Where Security Accountability Stops and Starts in the Public Cloud
For years, security was cited as a prime reason not to put sensitive data or…
3 minutes read