Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address

Cybercriminals are becoming increasingly proficient at infiltrating enterprises…


CyberArk Introduces Privileged Access Security Assessment Tool

Privileged access security is a key pillar of an effective security program. We…


Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy

As Shep Hyken recently noted, personalization continues to become more personal…


Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe

Cybersecurity isn’t getting any easier. To better understand the day-to-day…


BlueKeep: firewall best practices from Sophos

CVE-2019-07-08, nicknamed BlueKeep, is a critical remote code execution…


Sophos has acquired MDR specialists Rook Security

Cybercriminals are resourceful, organized and relentless, and businesses need…


Sophos. Intercept X for Server – now with EDR

Sophos announced the launch of Intercept X Advanced for Server with EDR,…


Boldon James. GDPR One Year On… What Have We Learnt?

It’s now one year on since the GDPR came in to effect – a regulation with an…


CyberArk. Version 10.9 Extends Security to Privileged Business Users

CyberArk recently announced version 10.9 of the CyberArk Privileged Access…


Trustwave. So, You’ve Been Breached: 9 Steps to Mitigate the Fallout

Discovering that you’ve been the victim of a breach is never pleasant. Perhaps…


Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like

Serving as the storekeeper of your most sensitive assets, from college…


GlobalSign supports newly implemented EU electronic invoicing regulation

GlobalSign (www.globalsign.com), a global Certificate Authority (CA) and…


Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt

As organizations learn that sophisticated attackers are dwelling unnoticed on…


SC Labs awards Sophos XG Firewall five stars

SC Media recently reviewed XG Firewall and awarded it their top 5-star rating…


Sophos. How Intercept X stops MegaCortex ransomware

This month, SophosLabs has been examining a new ransomware attack called…


Boldon James. Accountability the Next Step in Data Protection

The UK’s Information Commissioner stressed in a speech that nearly one year…


Boldon James. How much does the average employee know about data privacy?

With the impacts and repercussions of the looming California Consumer Privacy…


Boldon James. Enterprises Must Take Insider Threats More Seriously

Security teams need to consider the possibility of internal as well as external…


CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported

In May, it will be a year since the enforcement of the EU GDPR began. In the…


CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

CyberArk is honored to be named a 5-Star Security Vendor – the highest rating…


Sophos. Searching for malicious PowerShell executions with Intercept X

Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not…


Sophos. SD-WAN and XG Firewall

Few terms in networking have generated as much buzz recently as SD-WAN (or…


9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk

NSS together with CyberArk and Sophos will inform you of the latest cyber…


Sophos Cloud Optix is solving the toughest challenges in public cloud security

You move to the public cloud with the dream of infrastructure cost savings,…


How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks

Earlier this week, news broke that a Chinese woman attempted to sneak a USB…


Making the most of your Sophos XG Firewall

XG Firewall v17.5 recently delivered several new innovations including Lateral…


CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation

The age of digital transformation is upon us. Cloud, virtualization and…


AV-Test and AV-Comparatives give Sophos Mobile Security 100%

AV-Comparatives recently tested 250 Android security apps available on the…


Sophos. A connected approach to compromised mailbox security

Your mailbox is more valuable than ever to attackers, with 93% of company…


CyberArk Version 10.8 Flies High in the Cloud

During this year’s RSA conference (visit us at booth #N6253!), CyberArk…