PRODUCTS

May 2023

Core Security. Balancing Internal and External Pen Testing

With the threat landscape expanding and criminals taking advantage of security gaps, organizations are turning to controls that can help them limit their exposure. Among other controls, penetration testing stands out because it simulates attackers’ malicious activities and tactics to identify security gaps in business systems or applications. A penetration test aims to understand what […]

Core Security. Balancing Internal and External Pen Testing Read More »

Core Security. The Role of In-House Penetration Testing

Security adviser Roger Grimes once famously wrote, “To beat hackers, you have to think like them.” Grimes explained that security professionals should step into the attackers’ shoes and seek how to break into corporate systems, discover weaknesses, and create robust security countermeasures. Walking the walk of an attacker is what penetration testing is all about.

Core Security. The Role of In-House Penetration Testing Read More »

Sophos Endpoint earns perfect scores in SE Labs Q1 2023 endpoint protection report

We’re delighted to share that Sophos Intercept X Endpoint Protection ranked as the industry best in SE Labs’ protection tests in the first quarter of 2023, achieving AAA ratings across the board. In both the Enterprise and SMB categories, we achieved the following: 100% rating for Protection Accuracy 100% rating for Legitimate Accuracy 100% rating

Sophos Endpoint earns perfect scores in SE Labs Q1 2023 endpoint protection report Read More »

Keeper Security. Password Management is Critical to Your Cybersecurity Strategy

From generating strong passwords to monitoring the security policies and practices of a company, password managers are powerful solutions that defend companies against cyberthreats and improve employee productivity. Continue reading to learn more about why password management is critical to every organization’s cybersecurity strategy. What is a Cybersecurity Strategy? A cybersecurity strategy is a plan

Keeper Security. Password Management is Critical to Your Cybersecurity Strategy Read More »

Terranova. 9 Examples of Social Engineering Attacks

All examples of social engineering take advantage of human nature, such as the willingness to trust others, to trick individuals into divulging sensitive information. Despite its prevalence, social engineering can be challenging to distill into a single formula. It’s one of the reasons 82% of data breaches involve the human element. Social engineering has become

Terranova. 9 Examples of Social Engineering Attacks Read More »

Sophos Intercept X with XDR recognized as the #1 XDR solution by G2 users

Sophos Intercept X with Extended Detection and Response (XDR) has been rated the #1 XDR solution by G2 users in their spring 2023 reports (March 2023). G2 distinctions and rankings are based solely on independent, verified customer reviews on G2.com, the world’s largest software marketplace and peer-review platform. Check out the full reviews on G2.com

Sophos Intercept X with XDR recognized as the #1 XDR solution by G2 users Read More »