Our Blog
Sophos. What makes a great firewall?
We know that a firewall is the first line of defense against external threats. It…
1 minute read
Sophos. Protecting the treasure trove
Ransomware has been on the computer security radar for some time now but are you…
2 minutes read
Sophos. UTM 9.5 is on its way
UTM 9.5, including many new features you’ve asked us for, is just around the corner…
3 minutes read
CyberArk. Your Greatest Threat Might Already Be Inside Your Network
Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics are…
4 minutes read
Sophos. Best practice lays the foundation for defence
In the UK we have recently seen lots of headlines about cyber security and incidents…
4 minutes read
Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)
It’s widely understood that cyber intruders and internal threat actors seek and exploit privileged accounts…
3 minutes read
Releasing LogPoint 5.6.0
LogPoint is proud to announce LogPoint 5.6!Since the last large upgrade back in April 2016…
1 minute read
Corero. IoT Security Is an Oxymoron
The Internet of Things (IoT) continues to be a boon to hackers and a bane…
3 minutes read
Sophos. Why you should put your staff to the test with phishing drills
When Sophos Phish Threat was released in January, we pointed out that: Email remains one…
5 minutes read
Corero: If You Haven’t Already Been DDoS’ed, Assume You Will Be
It’s no secret these days that cyber threats are rampant and varied. Ransomware, malware and…
4 minutes read