Tag: Sophos

Extended Detection and Response (XDR) – Guide pour débutants

As powerful as EDR tools are, they are limited to detecting and responding to threats to endpoints and servers. This is not a disadvantage...

Three Lies you’ve Heard about Threat Hunting

The term "Threat Hunting" doesn't deserve to be placed on the security buzzword bingo board alongside terms like "artificial intelligence," "real time," and "next-gen,"...

Three Lies you’ve Heard about Threat Hunting

The term "Threat Hunting" doesn't deserve to be placed on the security buzzword bingo board alongside terms like "artificial intelligence," "real time," and "next-gen,"...

The State of Ransomware 2020

Ransomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specifically on enterprise...

How to Avoid the Phishing Net

Phishing emails are the most common cyberthreat affecting organizations today. As cyber crooks continue to improve and perfect their techniques, your users are more...

Sophos XG Firewall

Sophos Central is at the heart of everything we do. Our cloud management platform provides a single pane of glass to not only manage...

Synchronized Security – A Revolution in Protection

IT security professional have attempted to “connect the dots” between data sources by by employing correlation engines, big data warehouses, Security Information and Event...

The State of Ransomeware 2020

One interesting finding from the survey is that 3% of organizations said their data was not encrypted but they were still held to ransom....

The State of Ransomeware 2020

One interesting finding from the survey is that 3% of organizations said their data was not encrypted but they were still held to ransom....

The State of Ransomeware 2020

One interesting finding from the survey is that 3% of organizations said their data was not encrypted but they were still held to ransom....

Also Checkout