John Zorabedian

TypeTitleAuthorRepliesLast updated
Blog entryWhat should you expect from a next-gen endpoint protection solution? 08 years 8 months ago
Blog entrySophos Year in Review 2015 09 years 2 months ago
Blog entrySophos Cybersecurity Predictions for 2016 09 years 3 months ago
Blog entrySynchronized Security: A revolution in protection 09 years 3 months ago
Blog entryCan we test APT defenses even if we can’t agree on how to define APTs? 09 years 4 months ago
Blog entryGameover’s back from the dead? Why law enforcement couldn’t kill it 09 years 7 months ago
Blog entrySomeone’s snooping on your email – here’s what you can do about it 09 years 9 months ago
Blog entryMobile negligence – are you guilty of this and other “Deadly IT Sins”? 09 years 11 months ago
Blog entryWhat the Anthem breach means for healthcare organizations 010 years 1 week ago
Blog entryFour ways small businesses get security wrong 010 years 2 months ago
Blog entryWhat’s causing the explosive growth in Android malware threats? 010 years 4 months ago
Blog entryWhy Shellshock is worse than Heartbleed 010 years 5 months ago
Blog entryWhat we know and don’t know about the Home Depot breach 010 years 6 months ago
Blog entryHow cunning malware fights analysis by security researchers 010 years 6 months ago
Blog entryFirefox is hot but trust is thin in Chrome 010 years 7 months ago
Blog entryConspiracy theories answered: What happened to TrueCrypt and is it really dead? 010 years 8 months ago
Blog entryRansomware Strikes Mobile Devices – What NOT to Do 010 years 9 months ago
Blog entryIT Admins Are More Stressed Than Ever - But There's A Simple Way To Chill Out 010 years 9 months ago