Our Blog
CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide
CyberArk is honored to be named a 5-Star Security Vendor – the highest rating in…
2 minutes read
Sophos. Searching for malicious PowerShell executions with Intercept X
Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not malicious, but PowerShell…
2 minutes read
Sophos. SD-WAN and XG Firewall
Few terms in networking have generated as much buzz recently as SD-WAN (or Software Defined…
5 minutes read
9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk
NSS together with CyberArk and Sophos will inform you of the latest cyber threats and…
4 minutes read
How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks
Earlier this week, news broke that a Chinese woman attempted to sneak a USB stick…
2 minutes read
Making the most of your Sophos XG Firewall
XG Firewall v17.5 recently delivered several new innovations including Lateral Movement Protection, management via Sophos…
4 minutes read
CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation
The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream….
4 minutes read
AV-Test and AV-Comparatives give Sophos Mobile Security 100%
AV-Comparatives recently tested 250 Android security apps available on the Google Play Store against 2,000…
2 minutes read
Sophos. A connected approach to compromised mailbox security
Your mailbox is more valuable than ever to attackers, with 93% of company breaches in…
2 minutes read
CyberArk Version 10.8 Flies High in the Cloud
During this year’s RSA conference (visit us at booth #N6253!), CyberArk announced the release of…
6 minutes read