PRODUCTS

February 2019

CyberArk. Stay Safe with Proven Privileged Access Security

Daily morning headlines from Dark Reading, Krebs on Security, ThreatPost and others remind us that breaches are inevitable – they are not a matter of “if,” but instead, “when.” This is increasingly understood, so one wonders if this reality leads people to make overly rash decisions based on what they read with their morning cuppa […]

CyberArk. Stay Safe with Proven Privileged Access Security Read More »

Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security

The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider threats, organizations can’t guarantee that everything on the inside of their network can be trusted. This is the principle of Zero Trust architecture. These days, organizations need to build controls immediately around the individual data assets, wherever they reside. Administrators

Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security Read More »

Trustwave: How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface

I recently listened to a podcast discussing the expanding legalization of sports betting in the United States. The guest turned out to be a cybersecurity enthusiast-turned-professional poker player. In one part of the show, he described how, in advance of the Super Bowl, sportsbooks offer hundreds of bets known as propositions, or “props,” on which

Trustwave: How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface Read More »

Boldon James. What Financial Services Executives Need To Know About Data Security

The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. It’s easy to understand why. The industry is known for its wide array of interconnected systems and the processing of millions of transactions — factors that render it particularly vulnerable to attack. As the threat, frequency and impact

Boldon James. What Financial Services Executives Need To Know About Data Security Read More »

Logpoint. Did you have coffee with a hacker this morning?

Your organization likely spends resources in preventing external breaches and taking the necessary measures to ensure that your company’s data is protected. However, did you consider if you’re having coffee with a hacker every morning? Organizations tend to forget that more than one out of four breaches involve internal actors. According to the 2018 Verizon

Logpoint. Did you have coffee with a hacker this morning? Read More »

Boldon James. Bridging The Chasm Between Security And Data Management

The primary reason most organisations look at classifying the data they create and handle is to control access to sensitive information, driven by the need to manage security risk and comply with regulations, such as GDPR. However, this scope is too narrow. By focusing solely on these objectives, they’re missing an opportunity to embrace data

Boldon James. Bridging The Chasm Between Security And Data Management Read More »

See the future of cybersecurity with the new version of Sophos Home

The new version of Sophos Home brings business-grade cybersecurity to your home. New features added to Sophos Home which bring powerful, business-grade cybersecurity straight to your home. Cybercrime is big business, but it doesn’t just target big businesses. Individuals are just as vulnerable to malware and other threats as hospitals, banks, retailers, and other organizations. With Sophos

See the future of cybersecurity with the new version of Sophos Home Read More »