- Sophos MDR: New analyst response actions for Microsoft 365
- Beyond the kill chain: What cybercriminals do with their money (Part 5)
- Beyond the kill chain: What cybercriminals do with their money (Part 4)
- Beyond the kill chain: What cybercriminals do with their money (Part 3)
- Beyond the kill chain: What cybercriminals do with their money (Part 2)
- Beyond the kill chain: What cybercriminals do with their money (Part 1)
- Sophos Firewall v21.5: DNS protection
- Microsoft primes 71 fixes for May Patch Tuesday
- Sie kommen aus Nordkorea: Wie Unternehmen sich gegen falsche IT-Profis schützen können
- ENISA Launches European Vulnerability Database to Bolster EU Cyber Resilience
- Nineteen Sophos Women Recognized by CRN’s Women of the Channel
- AI Agents: Transformative or Turbulent?
- Exploring CNAPP Options for Cloud Security in 2025
- How Compliance Training Software Protects Your Business from Risk
- Introducing the Sophos MSP Elevate program
- Information security culture and phishing-reporting model: structural equivalence across Germany, UK, and USA
- WatchGuard transitions new CEO
- What Should You Consider When Choosing an AI Penetration Testing Company?
- Lumma Stealer, coming and going
- Emerging need to regulate deepfakes in international law: the Russo–Ukrainian war as an example