Logpoint. Why anti-virus alone can’t stop cryptocurrency mining

Cryptocurrencies like Bitcoin have been a source of worry since their creation. Fans of the…

Published September 12, 2018
7 minutes read

Sophos XG Architect Training (October 29-31, 2018)

This three-day training program was designed and intended for experienced technical professionals who want to…

Published September 2, 2018
3 minutes read

Sophos gets top marks in CRN’s 2018 Annual Report Card

At Sophos, we believe in being “channel best,” which is why we’re proud to announce…

Published August 29, 2018
2 minutes read

Take a tour of Sophos Central’s Endpoint and Intercept X Protection

There are numerous things you can do with Sophos Central, our cloud-based management platform. You…

Published August 28, 2018
1 minute read

CyberArk Launches SAP-certified Privileged Access Security Solution

CyberArk, the global leader in privileged access security, today announced the availability of its SAP-certified CyberArk…

Published August 24, 2018
3 minutes read

Phish Threat’s security awareness training gets animated

Real-life cyber threat headlines, Hollywood scripts and great animations come to Phish Threat. “I’ll admit…

Published August 23, 2018
2 minutes read

Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk

Savvy security practitioners understand that one of the most important, preventative steps they can take…

Published August 21, 2018
2 minutes read

Sophos. What is… cryptojacking?

To understand what cryptojacking is, you first need to understand cryptomining. Cryptomining is a lot…

Published August 21, 2018
1 minute read

How to make the most of your Sophos Endpoint

Yesterday evening I felt an all-too-familiar mix of pride and embarrassment as my seven-year old…

Published August 20, 2018
2 minutes read

Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small…

Published August 6, 2018
2 minutes read