Our Blog
7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security
CyberArk aims to make implementing and managing a robust privileged access program as easy as…
6 minutes read
Sophos Central Architect Training (20-22 March, 2019)
This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who…
6 minutes read
CyberArk. Stay Safe with Proven Privileged Access Security
Daily morning headlines from Dark Reading, Krebs on Security, ThreatPost and others remind us that…
4 minutes read
Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security
The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider…
2 minutes read
Boldon James. What Financial Services Executives Need To Know About Data Security
The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the…
4 minutes read
Logpoint. Did you have coffee with a hacker this morning?
Your organization likely spends resources in preventing external breaches and taking the necessary measures to…
6 minutes read
Boldon James. Bridging The Chasm Between Security And Data Management
The primary reason most organisations look at classifying the data they create and handle is…
4 minutes read
See the future of cybersecurity with the new version of Sophos Home
The new version of Sophos Home brings business-grade cybersecurity to your home. New features added…
2 minutes read
Sophos Acquires DarkBytes as Foundation of New MDR Services
Sophos, a global leader in network and endpoint security, today announced that it has acquired…
3 minutes read
Boldon James. True Data Privacy Cannot Exist Without Addressing The Insider Threat
Protecting sensitive customer data is a huge priority for today’s organizations, which face intensifying regulatory…
7 minutes read