Maximize your investments in Identity Governance and Privileged Access Security

Privileged access security is too often implemented independently from an identity governance solution, which can…

Published June 18, 2018
1 minute read

Cybercriminals are after your servers too!

Your servers hold your most critical data, your business applications and your highest privilege accounts,…

Published June 12, 2018
4 minutes read

Sophos ranks #1 in exploit protection!

Exploits are the techniques that attackers use to gain access and control of computers. Common…

Published June 11, 2018
2 minutes read

Sophos. Stop rolling your eyes at machine learning

When I speak about machine learning I know I run the risk of having half…

Published June 6, 2018
3 minutes read

GDPR is here – how Sophos protects your data

With the implementation of the EU General Data Protection Regulation (GDPR) coming into force today,…

Published June 6, 2018
2 minutes read

Think Twice Before You Click to Save Credentials in a Web Browser

It’s increasingly common: attackers target credentials stored within web browsers. Such attacks could happen on…

Published June 6, 2018
2 minutes read

GDPR: protect yourself from data theft

Organizations everywhere are preparing for the enforcement of the EU’s General Data Protection Regulation (GDPR)….

Published May 25, 2018
2 minutes read

Small is beautiful: meet our new Sophos desktop firewall and UTM appliances

We recently launched the new generation of our award-winning XG and SG Series desktop firewall…

Published May 24, 2018
3 minutes read

8 more reasons to try Sophos

At Sophos we try hard to keep our customers secure, safe and satisfied with easy…

Published May 24, 2018
2 minutes read

The endpoint attack chain… simplified

A comprehensive, defense in depth strategy using layers of overlapping protection has proven to be…

Published May 24, 2018
3 minutes read