Many organizations are considering next-generation solutions to deal with the unknown threats cybercriminals use to evade traditional defenses. One technology that’s had a fair share of hype is the sandbox. 365 more words
Tags » Enduser
After four years of preparation to overhaul the European Union’s data protection rules, the members of the EU Parliament gave final approval yesterday to the… 294 more words
IT teams in organizations of all sizes understand that sophisticated cyberattacks can use unknown malware to evade traditional gateway and endpoint protection.
These advanced persistent threats, or APTs, use custom-developed targeted attacks to gain access to a network and remain undetected for long periods of time. 584 more words
The Radicati Group has just released its Enterprise Mobility Management – Market Quadrant 2016 report, and we’re proud that Sophos has earned a place in the Top Players quadrant, demonstrating our leadership in the industry. 329 more words
As the information security industry matures, we’re beginning to come to terms with the reality that there is no such thing as perfect prevention. Conventional wisdom in information assurance tells us to assemble best-of-breed network and endpoint components into arrays of controls that will provide some reasonable measure of defense in depth. 998 more words
Attackers today are increasingly sophisticated, using multiple techniques and points of entry to bypass defenses and evade detection. In response, most vendors design their products to wrap endpoints and users in layers of security. 271 more words