Our Blog
Sophos ranks #1 in exploit protection!
Exploits are the techniques that attackers use to gain access and control of computers. Common…
2 minutes read
Sophos. Stop rolling your eyes at machine learning
When I speak about machine learning I know I run the risk of having half…
3 minutes read
GDPR is here – how Sophos protects your data
With the implementation of the EU General Data Protection Regulation (GDPR) coming into force today,…
2 minutes read
Think Twice Before You Click to Save Credentials in a Web Browser
It’s increasingly common: attackers target credentials stored within web browsers. Such attacks could happen on…
2 minutes read
GDPR: protect yourself from data theft
Organizations everywhere are preparing for the enforcement of the EU’s General Data Protection Regulation (GDPR)….
2 minutes read
Small is beautiful: meet our new Sophos desktop firewall and UTM appliances
We recently launched the new generation of our award-winning XG and SG Series desktop firewall…
3 minutes read
8 more reasons to try Sophos
At Sophos we try hard to keep our customers secure, safe and satisfied with easy…
2 minutes read
The endpoint attack chain… simplified
A comprehensive, defense in depth strategy using layers of overlapping protection has proven to be…
3 minutes read
Your network firewall’s dirty secrets
“There are some things your firewall would rather you didn’t know“. In our recent next-gen…
2 minutes read
Switching from SonicWall to Sophos just got even easier
If you’re planning a migration from SonicWall to XG Firewall, or at least thinking about…
3 minutes read