John Zorabedian

TypeTitleAuthorRepliesLast updated
Blog entryWhat should you expect from a next-gen endpoint protection solution? 08 years 12 months ago
Blog entrySophos Year in Review 2015 09 years 6 months ago
Blog entrySophos Cybersecurity Predictions for 2016 09 years 6 months ago
Blog entrySynchronized Security: A revolution in protection 09 years 7 months ago
Blog entryCan we test APT defenses even if we can’t agree on how to define APTs? 09 years 8 months ago
Blog entryGameover’s back from the dead? Why law enforcement couldn’t kill it 09 years 11 months ago
Blog entrySomeone’s snooping on your email – here’s what you can do about it 010 years 3 weeks ago
Blog entryMobile negligence – are you guilty of this and other “Deadly IT Sins”? 010 years 3 months ago
Blog entryWhat the Anthem breach means for healthcare organizations 010 years 4 months ago
Blog entryFour ways small businesses get security wrong 010 years 5 months ago
Blog entryWhat’s causing the explosive growth in Android malware threats? 010 years 8 months ago
Blog entryWhy Shellshock is worse than Heartbleed 010 years 8 months ago
Blog entryWhat we know and don’t know about the Home Depot breach 010 years 9 months ago
Blog entryHow cunning malware fights analysis by security researchers 010 years 10 months ago
Blog entryFirefox is hot but trust is thin in Chrome 010 years 11 months ago
Blog entryConspiracy theories answered: What happened to TrueCrypt and is it really dead? 011 years 2 weeks ago
Blog entryRansomware Strikes Mobile Devices – What NOT to Do 011 years 4 weeks ago
Blog entryIT Admins Are More Stressed Than Ever - But There's A Simple Way To Chill Out 011 years 1 month ago