With Sophos' decision to retire on-premise legacy security platforms and focus on next-generation products, I thought today we would have a quick look at the key advantages of synchronised security and how it can save you money.
Teams, Zoom, or Webex?
I’ve been watching with interest the sharp rise in uptake of video conferencing apps during CV-19 lockdown. So far, they've done a great job in meeting the rising demands of our need to communicate and video conference with one another.
Chess Help Protect Our NHS
Necessity, it is said, is the mother of invention. While this is true, it has become clear over recent weeks that the shared concern around the COVID- ...
Securing Remote Workers
Watch the recording of Security Remote Workers webinar. During the online session, our Chief Information Security Officer and a Sophos Product Specialist discuss the best practices to secure remote working in the current situation.
A Hackers Guide to Remote Working
Remote working for a hacker is brilliant, and not in the sense that they can work from home in a dark room wearing a hoodie. But because remote working means that a business is intentionally giving a path into the internal network that could potentially be accessed by anyone on the internet. This blog post covers some of the things that we have encountered across the team over the years.
Who is looking after your network when you are asleep?
During the online session Eric Kokonas, MTR Senior Product Marketing Manager, and Mat Gangwer, MTR Technical Director, reviewed the threat landscape, explained how MTR fits in an organisation’s cybersecurity strategy and provided an overview of the service.
Sophos Managed Threat Response (MTR)
We interviewed Peter Mackenzie, Incident Response Team Leader at Sophos, and Jez Turner, Cybersecurity Sales Director at Chess, about the new service by Sophos. Watch the video today.
Types of Penetration Test - What is the Difference?
Learn about the different types of penetration testing
Simplifying Digital Transformation: How CASB can help reduce the causes of slow cloud adoption
Dave Barnett, Head of CASB at Forcepoint, shares the lessons he has learned from over 80 customer implementations of CASB technology – the good, the bad and the downright ugly.
What is next for malware?
Malware is a major problem worldwide, but the nature of malware is changing.
Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially when there’s money to be made.
We welcome Jonathan and Fraser from Sophos HQ – they’re with us to discuss if AI can help towards the fight, and what we can do to protect ourselves.
Penetration Test Versus Vulnerability Assessment
For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.
Securing the Public Cloud with Sophos and Chess
Are you managing, moving, or planning to move to Amazon Web Services, Microsoft Azure, or Google Cloud Platform? Watch this video to learn more about how you can ensure the security of your data in the cloud.
Sophos Cloud Optix - Everything You Need to Know
Introducing the brand new Sophos product, that tracks assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeps them safe.
Going Phishing With Office 365
How Easy Is It To Hack Office 365 and 2FA?
This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.
CREST Certified Penetration Test Sample Report
Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report?
Sophos Intercept X with EDR Review