Our Blog
CyberArk. Insiders and the Privileged Pathway of Attacks
Corroborating the recent surge in headlines, a new industry study reveals that 56 percent of…
2 minutes read
Introducing the latest release of the LogPoint Agent and LogPoint 5.6.0
After a long period of development, we are now ready with the largest feature release…
3 minutes read
GlobalSign. Tips to Browsing the Internet Safely without Being Tracked
Protecting your online anonymity is no piece of cake. After all, today’s internet ecosystem –…
5 minutes read
SC Media awards Sophos XG Firewall the full five stars
“This demands your attention no matter what size your organization.” SC Media has given XG…
2 minutes read
Sophos UTM 9.5 is here – easier, faster and more flexible
Drawing on your feedback and requests, we have developed Sophos UTM 9.5. This latest update…
3 minutes read
GlobalSign. How to Spot a Phishing Website
Phishing isn’t an unfamiliar term in these parts. In a previous blog post, we tackled…
9 minutes read
Sophos. What makes a great firewall?
We know that a firewall is the first line of defense against external threats. It…
1 minute read
Sophos. Protecting the treasure trove
Ransomware has been on the computer security radar for some time now but are you…
2 minutes read
Sophos. UTM 9.5 is on its way
UTM 9.5, including many new features you’ve asked us for, is just around the corner…
3 minutes read
CyberArk. Your Greatest Threat Might Already Be Inside Your Network
Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics are…
4 minutes read