Blog

Sophos Firewall Configuration Viewer: Audit and Compare Configs
Make Sophos Firewall configs readable, searchable, and comparable in your browser - with HTML exports and diffs.
Network Sophos
magic-wormhole: Secure File Transfer with a One-Time Code
magic-wormhole explained: transfer files end-to-end encrypted with a one-time code, without accounts or cloud storage.
Network
DDoS Attacks: Types, Symptoms, and Mitigation
A factual overview of DDoS: from amplification to Layer 7, including practical measures for website and API operators.
Network
Enemy on the Team - The North Korean IT Worker Trick
How North Korean IT workers infiltrate companies and attack them from within. The case of a laptop farm shows why genuine identity verification is crucial.
Network
Sophos Firewall v22 Health Check - Complete Overview
Sophos Firewall v22 with new Health Check: CIS checks, Secure by Design, and best practices for maximum network security.
Network Sophos
Sophos Firewall v22 - New features, hardening, and what to expect
Sophos Firewall v22 brings Health Check, Secure-by-Design, and container architecture. What admins should know now.
Network Sophos
Sophos Updates September 2025 – Firewall, Endpoint, E-Mail
All technical Sophos updates in September 2025 – structured by product. Firewall, Endpoint, Identity, E-Mail. Quick overview for admins.
Network Sophos
Sophos Update: Partner Online Event News (SFOS 22 and more)
Sophos Partner Event 2025: All about Firewall v22, NDR, ITDR, and criticism on Synchronized Security, hardware, and pricing. Insights & challenges.
Network Sophos
Whoop 5.0: The Fitness Tracker That Sets New Standards
A comprehensive analysis of the Whoop 5.0, based on official sources and more than 40 days of hands-on experience.
Health
Britain's Surveillance Policy Forces Apple to Abandon Encryption
Apple must disable end-to-end iCloud encryption in the UK—setting a global precedent in the tug-of-war between privacy and state surveillance.
Apple Network