Our Blog
Maximize your investments in Identity Governance and Privileged Access Security
Privileged access security is too often implemented independently from an identity governance solution, which can…
1 minute read
Cybercriminals are after your servers too!
Your servers hold your most critical data, your business applications and your highest privilege accounts,…
4 minutes read
Sophos ranks #1 in exploit protection!
Exploits are the techniques that attackers use to gain access and control of computers. Common…
2 minutes read
Sophos. Stop rolling your eyes at machine learning
When I speak about machine learning I know I run the risk of having half…
3 minutes read
GDPR is here – how Sophos protects your data
With the implementation of the EU General Data Protection Regulation (GDPR) coming into force today,…
2 minutes read
Think Twice Before You Click to Save Credentials in a Web Browser
It’s increasingly common: attackers target credentials stored within web browsers. Such attacks could happen on…
2 minutes read
GDPR: protect yourself from data theft
Organizations everywhere are preparing for the enforcement of the EU’s General Data Protection Regulation (GDPR)….
2 minutes read
Small is beautiful: meet our new Sophos desktop firewall and UTM appliances
We recently launched the new generation of our award-winning XG and SG Series desktop firewall…
3 minutes read
8 more reasons to try Sophos
At Sophos we try hard to keep our customers secure, safe and satisfied with easy…
2 minutes read
The endpoint attack chain… simplified
A comprehensive, defense in depth strategy using layers of overlapping protection has proven to be…
3 minutes read