PRODUCTS

July 2021

Datto. How MSPs Can Prevent, Detect, and Respond to Ransomware Attacks

Ransomware attacks have all but dominated news headlines in recent weeks. Managed service providers (MSPs) know the risks of ransomware and how important it is to have a plan in place to respond to an attack when they have an impacted client. There are many different factors to consider, but it’s best practice to have […]

Datto. How MSPs Can Prevent, Detect, and Respond to Ransomware Attacks Read More »

Sophos Firewall OS v18.5 MR1 early access is now available

The product team is pleased to announce the early access program for SFOS v18.5 MR1 for all Sophos (XG) Firewall devices and all SFOS form factors – XGS Series, XG Series, virtual and software appliances, as well as all supported cloud platforms. SFOS v18.5 MR1 includes support for new Sophos Central Orchestration capabilities and a

Sophos Firewall OS v18.5 MR1 early access is now available Read More »

Sophos Acquires Capsule8

Sophos acquired Capsule8. “I’m excited to share that Sophos has acquired Capsule8, a pioneer and market leader of runtime visibility, detection and response for Linux production servers and containers covering both on-premises and cloud workloads” said Dan Schiappa, Chief Product Officer at Sophos. Sophos already protects more than two million servers for over 85,000 customers worldwide. Comprehensive

Sophos Acquires Capsule8 Read More »

Acunetix. Do you want your security to be built on excuses?

In the cybersecurity world, it’s only natural to balance risks and security measures. After all, there is no way to achieve absolute security and therefore you have to say stop somewhere. However, if you rely on excuses and underestimate the threats, you’re very likely to become a victim of a serious attack. Cybercriminals are smart

Acunetix. Do you want your security to be built on excuses? Read More »

Acunetix. Do you want your security to be built on excuses?

In the cybersecurity world, it’s only natural to balance risks and security measures. After all, there is no way to achieve absolute security and therefore you have to say stop somewhere. However, if you rely on excuses and underestimate the threats, you’re very likely to become a victim of a serious attack. Cybercriminals are smart

Acunetix. Do you want your security to be built on excuses? Read More »

Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing

At Invicti, we are absolutely thrilled to be recognized for the first time in the Magic Quadrant for Application Security Testing this year. Gartner is a leading IT research and advisory firm that helps businesses of all sizes evaluate technology and make informed decisions. We feel our acknowledgment in the report is a big deal,

Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing Read More »

Sophos: Independence Day – REvil uses supply chain exploit to attack hundreds of businesses

On July 2, while many businesses had staff either already off or preparing for a long holiday weekend, an affiliate of the REvil ransomware group launched a widespread crypto-extortion gambit.  Using an exploit of Kaseya’s  VSA remote management service, the REvil actors launched a malicious update package that targeted customers of managed service providers and

Sophos: Independence Day – REvil uses supply chain exploit to attack hundreds of businesses Read More »

Sophos. Intercept X now supports Windows ARM64

We are pleased to announce that today, June 24, Intercept X now supports for Windows ARM64 devices. This is an exciting milestone, as devices using ARM64 processors are increasingly common in many organizations. Available to all Intercept X customers, this initial release includes many of the powerful defensive capabilities of Intercept X, with more features

Sophos. Intercept X now supports Windows ARM64 Read More »

Boldon James. Top Data Security Challenges Organizations Face Today

Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Whether data security worries center around internal security lapses or stem from the harsh reality of being targeted by those with malicious intent, organizations face a constant need to be on the alert and protective of sensitive data. Rather than

Boldon James. Top Data Security Challenges Organizations Face Today Read More »