Our Blog
Logpoint. Why anti-virus alone can’t stop cryptocurrency mining
Cryptocurrencies like Bitcoin have been a source of worry since their creation. Fans of the…
7 minutes read
Sophos XG Architect Training (October 29-31, 2018)
This three-day training program was designed and intended for experienced technical professionals who want to…
3 minutes read
Sophos gets top marks in CRN’s 2018 Annual Report Card
At Sophos, we believe in being “channel best,” which is why we’re proud to announce…
2 minutes read
Take a tour of Sophos Central’s Endpoint and Intercept X Protection
There are numerous things you can do with Sophos Central, our cloud-based management platform. You…
1 minute read
CyberArk Launches SAP-certified Privileged Access Security Solution
CyberArk, the global leader in privileged access security, today announced the availability of its SAP-certified CyberArk…
3 minutes read
Phish Threat’s security awareness training gets animated
Real-life cyber threat headlines, Hollywood scripts and great animations come to Phish Threat. “I’ll admit…
2 minutes read
Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk
Savvy security practitioners understand that one of the most important, preventative steps they can take…
2 minutes read
Sophos. What is… cryptojacking?
To understand what cryptojacking is, you first need to understand cryptomining. Cryptomining is a lot…
1 minute read
How to make the most of your Sophos Endpoint
Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as my seven-year old…
2 minutes read
Sophos ranks #1 for endpoint protection by SE Labs
Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small…
2 minutes read