Sophos

SecuritySophos

Sophos UTM 9.5 is here – easier, faster and more flexible

Credit to Author: Chris McCormack| Date: Fri, 05 May 2017 16:25:17 +0000

The wait is over, Sophos UTM 9.5 has arrived and it’s packed with new features.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33577&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/u-_pawPgmxA” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Get ahead of the GDPR curve – sign up for our event

Credit to Author: Editor| Date: Tue, 02 May 2017 16:45:48 +0000

The EU regulation coming into force in 2018 will transform the way data compliance is handled in the UK – irrespective of Brexit. Make sure you are ahead of the curve by attending our General Data Protection Regulation (GDPR) event in Reading on 18 May.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33524&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QKQJtI5It9g” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

SC Media awards XG Firewall the full five stars

Credit to Author: Chris McCormack| Date: Tue, 02 May 2017 14:04:49 +0000

‘This demands your attention no matter what size your organization’ – we couldn’t agree more!<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33537&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/DraWRAAlD3U” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Fertility patient data breach fine would have been much higher under GDPR

Credit to Author: John Bryan CIPP/E| Date: Fri, 28 Apr 2017 14:35:17 +0000

What happened at Lister Hospital serves as an example to all businesses as how easy it is to fall foul of the new data privacy legislations.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33331&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/oNd7hMLrB5o” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Calling all bug hunters: Sophos teams up with Bugcrowd

Credit to Author: Bill Brenner| Date: Tue, 25 Apr 2017 17:29:38 +0000

Adversarial relationships between vendors and security researchers used to be common. Researchers would report a bug and the vendor &#8211; not all but certainly more than a few &#8211; would drag its feet in patching the problem. Then, the researcher would make the findings public and the vendor would criticize them for releasing information attackers could [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33460&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/mNdfmUH8YgY” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Protecting the treasure trove

Credit to Author: gailferreirasophos| Date: Fri, 21 Apr 2017 09:27:20 +0000

Ransomware has been on the computer security radar for some time now but are you aware that it’s increasingly targeting servers? Servers are the treasure trove of an organization’s data and the applications that access it. As senior vice president and general manager of Sophos’ Enduser and Network Security Groups Dan Schiappa explains, “Servers are [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33352&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/tW15Xcj4ApE” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

ICYMI: New features for Sophos UTM on AWS

Credit to Author: Bryan Nairn| Date: Mon, 17 Apr 2017 15:18:21 +0000

Over the past few months we’ve added new features and functionality to Sophos UTM on AWS. Changes occur more frequently in the cloud, so we wanted to provide you a summary of everything that has happened in case you missed it. These enhancements allow you to run Sophos UTM in additional AWS Regions, take advantage […]

Read More
SecuritySophos

Android malware anti-emulation techniques

Credit to Author: Bill Brenner| Date: Thu, 13 Apr 2017 15:35:54 +0000

The following report is by SophosLabs Android specialist Chen Yu, with support from Android team members William Lee, Jagadeesh Chandraiah and Ferenc László Nagy. As the amount of Android malware grows, it follows every step of its Windows counterparts when it comes to techniques used to evade emulators used for dynamic analysis. In this blog post, we’ll show some […]

Read More