Search Results
348 results
Your search is now limited to «Sophos» expert search.
Express Computer 01/22/2019 05:36
The Have I Been Pwned? (HIBP) website has revealed another huge cache of breached email addresses and passwords discovered last week circulating among criminals. We outline key steps that you should do in case of a breach. The post What to do if your organisation suffers a data breach appeared first on Express Computer .
More from Express Computer:
A Chilean Senator has taken to Twitter with alarming news – the company running the country’s ATM network suffered a serious cyberattack.
More from Naked Security - SophosLabs blog:
SC Magazine - UK 01/18/2019 07:37
Paul Ducklin, senior technologist at Sophos, told SC that the moral of the story in "this case seems to be obvious: patch early, patch often!". "Worse still, vulnerabilities in internet-facing components such as your web server or content management system ...
More from SC Magazine - UK: 01/18/2019 05:06
Sophos said third-quarter constant currency billings, which represents the value of products and services invoiced to customers, rose 2 percent.
More from
Avid Secure was recently acquired by British security software company Sophos.
More from Solutions Review Technology News: 01/17/2019 12:00
Two Android apps infected with a banking malware dropper were found on the Google Play Store, already having been installed on thousands of Android devices and sporting dozens of fake five-star ratings. [...]
More from
SecurityWeek 01/17/2019 10:27
Onapsis, a company specializing in cybersecurity and compliance solutions for enterprise resource planning (ERP) products, on Wednesday announced that it has entered a definitive agreement to acquire competitor Virtual Forge. read more.
More from SecurityWeek:
Microsoft - Windows Blogs 01/15/2019 13:00
Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Customers should update with confidence, never worrying about compatibility across Windows versions. Achieving this goal requires […]. The post Application compatibility in the Windows ecosystem appeared first on Windows Blog .
AI Trends 01/15/2019 10:10
AI is being employed by attackers, such as within Deeplocker malware, which avoided a tight cyber security mechanism by utilising AI models to attack target hosgts using face recognition, geolocation and speech recognition. This attack speaks volumes about the huge role of AI in cyber security domains. To counter attack and defend, AI for cybersecurity […]
Reseller News (New Zealand) 01/14/2019 23:15
... channel understanding will be critical to our growth and expansion across the APJ region as we continue to deliver our channel first, channel best strategy,” said Michael Valentine, senior vice president of worldwide sales at Sophos.
More from Reseller News (New Zealand):
Security Bloggers Network 01/14/2019 10:43
Remove & Recover from SamSam ransomware ASAP. Protect your business and. recover your files. Contact Coveware™ for a free consultation right now. The post What Is SamSam Ransomware and How to Recover and Remove It [Guide] appeared first on Security Boulevard .
More from Security Bloggers Network:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications