Our Blog
Netsparker. Vulnerability Assessments and Penetration Tests – What’s the Difference? (Part I)
Confusion between the terms ‘penetration testing’ and ‘vulnerability assessments’ often begins at the level of…
7 minutes read
Sophos Security Heartbeat. Look who’s talking now: Your Wi-Fi, endpoints, mobiles…
With the introduction of Sophos Wireless v2.0 and the new APX Series Access Points, we’re…
2 minutes read
Logpoint. Why anti-virus alone can’t stop cryptocurrency mining
Cryptocurrencies like Bitcoin have been a source of worry since their creation. Fans of the…
7 minutes read
Sophos XG Architect Training (October 29-31, 2018)
This three-day training program was designed and intended for experienced technical professionals who want to…
3 minutes read
Sophos gets top marks in CRN’s 2018 Annual Report Card
At Sophos, we believe in being “channel best,” which is why we’re proud to announce…
2 minutes read
Take a tour of Sophos Central’s Endpoint and Intercept X Protection
There are numerous things you can do with Sophos Central, our cloud-based management platform. You…
1 minute read
CyberArk Launches SAP-certified Privileged Access Security Solution
CyberArk, the global leader in privileged access security, today announced the availability of its SAP-certified CyberArk…
3 minutes read
Phish Threat’s security awareness training gets animated
Real-life cyber threat headlines, Hollywood scripts and great animations come to Phish Threat. “I’ll admit…
2 minutes read
Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk
Savvy security practitioners understand that one of the most important, preventative steps they can take…
2 minutes read
Sophos. What is… cryptojacking?
To understand what cryptojacking is, you first need to understand cryptomining. Cryptomining is a lot…
1 minute read