Over the past few years, we’ve grown accustomed to steady improvements in computing performance without major jumps in device pricing. But that trend has reversed sharply. As we move through 2025 and into 2026, RAM costs have surged, and the impact on laptops, desktops, and workstations is unavoidable. This blog breaks down why RAM is […]
Limitations of Free Tools Building Stronger Security Awareness The Next Phase: Human Risk Management Choosing the Right Solution Organizations moving beyond free tools should look for: Free phishing tools are a useful starting point—but not a complete solution. To truly reduce human risk, organizations must adopt a holistic approach: drive behavior change, tailor training, build […]
On December 19, 2025, MongoDB Inc. disclosed a severe vulnerability in its database products, tracked as CVE-2025-14847. This flaw, dubbed MongoBleed, is an out-of-bounds memory read vulnerability in MongoDB’s implementation of Zlib message compression. It allows remote, unauthenticated attackers to read limited portions of system memory on MongoDB instances exposed to the internet. The vulnerability […]
Limitations of Free Tools Building Stronger Security Awareness The article outlines three core dimensions of an effective security awareness program: The Next Phase: Human Risk Management Choosing the Right Solution Organizations moving beyond free tools should look for: Bottom Line Free phishing tools are a useful starting point—but not a complete solution. To truly reduce […]
Apple macOS Tahoe 26.2 introduces Edge Light, a smart display-based lighting effect that enhances your image during video calls (FaceTime, Zoom, Teams, etc.) by providing soft illumination around your face: Technical Mechanics Behind Edge Light Component Role & Functionality Neural Engine Detects face shape, location, and ensures even light placement Image Signal Processor (ISP) Evaluates ambient […]
bva took on a new client recently which exposed us to a new security platform that we had never seen before. Its always fun to find a new product that hits the mark. Organizations have invested heavily in SIEM, EDR, NDR, IAM and MSSP services, yet breaches persist and SOC teams drown in noisy alerts. […]
Sophos has a significant enhancement to their service portfolio of cyber security. Last year, Sophos introduced DNS Protection for networks, which has since grown rapidly and is now approaching its 600 billionth query. Following this success, many of you requested a solution tailored for roaming endpoints, along with deeper visibility into DNS activity and support […]
Sophos MDR for Microsoft environments has achieved Microsoft Verified Small and Medium Business (SMB) Solution Status from the Microsoft Intelligent Security Association (MISA). This certification underscores the robust integration of Sophos MDR with Microsoft Defender for Business and Defender for Endpoint, affirming Sophos’ capability to deliver enterprise-grade managed detection and response solutions for Microsoft users. […]
Identity as the New Attack Surface Being a Sophos Partner for many years, we are always excited about new offerings they come out with. As our clients have embraced cloud and remote-first environments, identity systems have emerged as a primary target. According to Sophos X‑Ops, there was a 106% year-over-year increase in stolen credentials on the […]





