Our Blog
Boldon James. Bridging The Chasm Between Security And Data Management
The primary reason most organisations look at classifying the data they create and handle is…
4 minutes read
See the future of cybersecurity with the new version of Sophos Home
The new version of Sophos Home brings business-grade cybersecurity to your home. New features added…
2 minutes read
Sophos Acquires DarkBytes as Foundation of New MDR Services
Sophos, a global leader in network and endpoint security, today announced that it has acquired…
3 minutes read
Boldon James. True Data Privacy Cannot Exist Without Addressing The Insider Threat
Protecting sensitive customer data is a huge priority for today’s organizations, which face intensifying regulatory…
7 minutes read
Stopping Emotet with Sophos
The US Department for Homeland Security considers Emotet to be one of the most costly…
10 minutes read
CyberArk. The CISO View on DevOps: New Report Highlights Approaches to Reduce Cyber Security Risk
CyberArk, the global leader in privileged access security, today issued a new research report, “The CISO…
4 minutes read
XG Firewall and Lateral Movement Protection
Sophos XG Firewall and Synchronized Security continue to innovate and push the envelope of what’s…
5 minutes read
Sophos Acquires Avid Secure to Expand Protection for Public Cloud Environments
Sophos, a global leader in network and endpoint security, today announced that it has acquired…
2 minutes read
What the experts are saying about Sophos XG Firewall?
We know from talking to our customer and partner community that XG Firewall delivers tremendous…
3 minutes read
Sophos XG Architect Training (February 26-28, 2019)
This three-day training program was designed and intended for experienced technical professionals who want to…
3 minutes read