Sophos. UTM 9.5 is on its way

UTM 9.5, including many new features you’ve asked us for, is just around the corner…

Published April 19, 2017
3 minutes read

CyberArk. Your Greatest Threat Might Already Be Inside Your Network

Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics are…

Published April 12, 2017
4 minutes read

Sophos. Best practice lays the foundation for defence

In the UK we have recently seen lots of headlines about cyber security and incidents…

Published April 8, 2017
4 minutes read

Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

It’s widely understood that cyber intruders and internal threat actors seek and exploit privileged accounts…

Published April 6, 2017
3 minutes read

Releasing LogPoint 5.6.0

LogPoint is proud to announce LogPoint 5.6!Since the last large upgrade back in April 2016…

Published March 23, 2017
1 minute read

Corero. IoT Security Is an Oxymoron

The Internet of Things (IoT) continues to be a boon to hackers and a bane…

Published March 21, 2017
3 minutes read

Sophos. Why you should put your staff to the test with phishing drills

When Sophos Phish Threat was released in January, we pointed out that: Email remains one…

Published March 17, 2017
5 minutes read

Corero: If You Haven’t Already Been DDoS’ed, Assume You Will Be

It’s no secret these days that cyber threats are rampant and varied. Ransomware, malware and…

Published March 13, 2017
4 minutes read

Sophos. Anti-malware is imperfect but still necessary. Here’s why.

Doctors sometimes make mistakes that harm the patient. Police often fail to protect and serve….

Published March 8, 2017
6 minutes read

Sophos Endpoint Exploit Prevention. Block Ransomware with the Power of Intercept X

The protection capabilities of Intercept X are now available to Endpoint Protection deployments managing their…

Published March 6, 2017
2 minutes read