Our Blog
GlobalSign supports newly implemented EU electronic invoicing regulation
GlobalSign (www.globalsign.com), a global Certificate Authority (CA) and leading provider of identity and security solutions…
2 minutes read
Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt
As organizations learn that sophisticated attackers are dwelling unnoticed on their networks for months –…
5 minutes read
SC Labs awards Sophos XG Firewall five stars
SC Media recently reviewed XG Firewall and awarded it their top 5-star rating across all…
1 minute read
Sophos. How Intercept X stops MegaCortex ransomware
This month, SophosLabs has been examining a new ransomware attack called MegaCortex that uses layers…
1 minute read
Boldon James. Accountability the Next Step in Data Protection
The UK’s Information Commissioner stressed in a speech that nearly one year into GDPR, the…
3 minutes read
Boldon James. How much does the average employee know about data privacy?
With the impacts and repercussions of the looming California Consumer Privacy Act (CCPA) on the…
4 minutes read
Boldon James. Enterprises Must Take Insider Threats More Seriously
Security teams need to consider the possibility of internal as well as external threats While…
8 minutes read
CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported
In May, it will be a year since the enforcement of the EU GDPR began….
6 minutes read
CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide
CyberArk is honored to be named a 5-Star Security Vendor – the highest rating in…
2 minutes read
Sophos. Searching for malicious PowerShell executions with Intercept X
Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not malicious, but PowerShell…
2 minutes read