Our Blog
Boldon James. Healthcare Breaches Affected 11.5 Million People In 2018
he total number of records exposed in the healthcare sector rose to 11.5 million in…
2 minutes read
7 uncomfortable truths of Endpoint Security: A Sophos report
A report released today by Sophos reveals that IT managers are more likely to catch…
6 minutes read
And the Award Goes To…The GlobalSign IoT Identity Platform!
Strong, unique identities are the core of IoT device security. Giving unique identities allows them…
5 minutes read
Sophos Intercept X Achieves Highest Scores in NSS Labs 2019 Advanced Endpoint Protection (AEP) Group Test
Sophos is a strong advocate for thorough independent testing of cybersecurity products to help customers…
3 minutes read
7 Ways CyberArk Simplifies Deployment, Integration and Scaling of Privileged Access Security
CyberArk aims to make implementing and managing a robust privileged access program as easy as…
6 minutes read
Sophos Central Architect Training (20-22 March, 2019)
This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who…
6 minutes read
CyberArk. Stay Safe with Proven Privileged Access Security
Daily morning headlines from Dark Reading, Krebs on Security, ThreatPost and others remind us that…
4 minutes read
Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security
The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider…
2 minutes read
Boldon James. What Financial Services Executives Need To Know About Data Security
The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the…
4 minutes read
Logpoint. Did you have coffee with a hacker this morning?
Your organization likely spends resources in preventing external breaches and taking the necessary measures to…
6 minutes read