PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos. Searching for malicious PowerShell executions with Intercept X

Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not malicious, but PowerShell can be (and often is) taken advantage of. The new Sophos EDR capabilities offer the ability to track down malicious executions that otherwise may remain hidden. For example, executions which use the encoded command argument are more likely to be […]

Sophos. Searching for malicious PowerShell executions with Intercept X Read More »

9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk

NSS together with CyberArk and Sophos will inform you of the latest cyber threats and will suggest ways to address them at the 9th Infocom Conference on 17th and 18th of April – Dais Conference Center. The concept of Industry 4.0 (aka the 4th Industrial Revolution), has begun to be reported more and more, reflecting

9th Infocom Security Conference 2019 with NSS, Sophos and CyberArk Read More »

Sophos Cloud Optix is solving the toughest challenges in public cloud security

You move to the public cloud with the dream of infrastructure cost savings, added agility, and taking full advantage of devOps process to speed up development and product delivery. A move to Amazon Web Services, Microsoft Azure or Google Cloud Platform can bring all that good stuff. But soon you’ll meet your new challenge of

Sophos Cloud Optix is solving the toughest challenges in public cloud security Read More »

How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks

Earlier this week, news broke that a Chinese woman attempted to sneak a USB stick loaded with malware into Mar-a-Lago, President Trump’s main place of residence outside of the White House. The news made international headlines due to the nationality of the alleged attacker and the location of the attempted attack. Using an external device

How Sophos Intercept X Advanced can protect you from Mar-a-Lago-like USB stick attacks Read More »

CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation

The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this age of innovation. Established industries like finance and healthcare are being disrupted by new and nimble startups who have leap-frogged established

CyberArk. 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation Read More »

AV-Test and AV-Comparatives give Sophos Mobile Security 100%

AV-Comparatives recently tested 250 Android security apps available on the Google Play Store against 2,000 of the most common Android threats from 2018. The test was designed to simulate real-world conditions and help Android users identify genuine, effective antivirus apps in a space where there’s no shortage of buggy, dubious or ineffective options. We were

AV-Test and AV-Comparatives give Sophos Mobile Security 100% Read More »

Sophos. A connected approach to compromised mailbox security

Your mailbox is more valuable than ever to attackers, with 93% of company breaches in security now starting with a phishing email. Whether users are targeted to receive phishing emails, or they have their mailbox compromised to send spam and viruses from your organization’s domain, the risks to your organization are great. The symptoms of

Sophos. A connected approach to compromised mailbox security Read More »

CyberArk Version 10.8 Flies High in the Cloud

During this year’s RSA conference (visit us at booth #N6253!), CyberArk announced the release of version 10.8 of the CyberArk Privileged Access Security Solution. Version 10.8 focuses on expanding and improving CyberArk’s ability to continuously discover and protect cloud environments as well as augmenting Just-in-Time capabilities for an easy-to-use privileged access control. We’ve included a

CyberArk Version 10.8 Flies High in the Cloud Read More »