John Zorabedian

TypeTitleAuthorRepliesLast updated
Blog entryWhat should you expect from a next-gen endpoint protection solution? 08 years 4 months ago
Blog entrySophos Year in Review 2015 08 years 10 months ago
Blog entrySophos Cybersecurity Predictions for 2016 08 years 11 months ago
Blog entrySynchronized Security: A revolution in protection 09 years 6 days ago
Blog entryCan we test APT defenses even if we can’t agree on how to define APTs? 09 years 1 month ago
Blog entryGameover’s back from the dead? Why law enforcement couldn’t kill it 09 years 3 months ago
Blog entrySomeone’s snooping on your email – here’s what you can do about it 09 years 5 months ago
Blog entryMobile negligence – are you guilty of this and other “Deadly IT Sins”? 09 years 8 months ago
Blog entryWhat the Anthem breach means for healthcare organizations 09 years 9 months ago
Blog entryFour ways small businesses get security wrong 09 years 10 months ago
Blog entryWhat’s causing the explosive growth in Android malware threats? 010 years 4 weeks ago
Blog entryWhy Shellshock is worse than Heartbleed 010 years 1 month ago
Blog entryWhat we know and don’t know about the Home Depot breach 010 years 2 months ago
Blog entryHow cunning malware fights analysis by security researchers 010 years 3 months ago
Blog entryFirefox is hot but trust is thin in Chrome 010 years 4 months ago
Blog entryConspiracy theories answered: What happened to TrueCrypt and is it really dead? 010 years 5 months ago
Blog entryRansomware Strikes Mobile Devices – What NOT to Do 010 years 5 months ago
Blog entryIT Admins Are More Stressed Than Ever - But There's A Simple Way To Chill Out 010 years 6 months ago