Uncategorized
The Cybersecurity Trust Reality in 2026
New Sophos survey reveals only 5% of IT leaders say they fully trust their cybersecurity vendors Categories: Products & Services, Sophos Insights Tags: Trust, Privacy, Trust Center
The High Cost of Low Trust: Our Commitment to Radical Transparency
Only 5% of organizations fully trust their cybersecurity providers. Let’s do better. Categories: Products & Services, Sophos Insights Tags: Trust, Trust Center, Privacy
Incident responders, s’il vous plait: Invites lead to odd malware events
A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway? Categories: Threat Research Tags: STAC6405, infostealer, RMM, Phishing
Where AI in the SOC is actually delivering — and where it isn’t
“We’ll have a generation of security professionals who can supervise AI but can’t function without it.” Categories: AI Research, Sophos Insights Tags: AI, AI Cybersecurity, AI RESEARCH, Generative AI, SOC
Sophos Firewall ranked the #1 overall firewall solution in G2’s Spring 2026 reports
Why organizations are choosing Sophos Firewall to reduce exposure and strengthen resilience Categories: Products & Services, Products Tags: Firewall, G2, Awards
Cybersecurity for Education – Sophos Protected Classroom
Categories: Products & Services Tags: Education, Endpoint, NDR, MDR
High-Five: Sophos Ranked Number 1 Overall in Endpoint, EDR, XDR, MDR, and Firewall in the G2 Spring 2026 Reports
#1 ranked in 78 global reports Categories: Products & Services Tags: MDR, network, Endpoint, Firewall
Oracle vulnerability (CVE-2026-21992) impacts core products
Categories: Threat Research Tags: advisory, vulnerability, Oracle
The global CISO landscape: A leadership gap too large to ignore
Why the world needs scalable security leadership — and MSPs and MSSPs are key to delivery Categories: Products & Services Tags: Featured, CISO, Survey
NICKEL ALLEY strategy: Fake it ‘til you make it
Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency Categories: Threat Research Tags: NICKEL ALLEY, Contagious Interview, North Korea, clickfix
