PRODUCTS

Cyber Security Elements by NSS

News

21

Aug

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants have experienced account takeovers1 and 81 percent have encountered email compromise2.

To mitigate this ongoing risk, Rubrik and Sophos have formed a strategic partnership to help lean IT teams strengthen their cyber resilience and simplify recovery from ransomware, account compromise, insider threats, and data loss in Microsoft 365.

The new joint solution will make Sophos M365 Backup and Recovery powered by Rubrik the only M365 data protection solution that is fully integrated into Sophos’ powerful cybersecurity console. For customers already relying on Sophos for detection and prevention, this integration provides fast and secure recovery of SharePoint, Exchange, OneDrive, and Teams data when it is accidentally or maliciously compromised.

Rubrik’s SaaS-based protection will be available through Sophos Central—the same platform security teams already trust to manage their defenses.

The Need Now is Greater than Ever

In early 2025, Microsoft 365 commercial (paid seats) surpassed 400 million users. If global admin credentials are breached for any of those millions of users, attackers can manipulate retention settings and permanently delete critical business data.

Native tools were not  built for cyber resilience at this scale. Litigation Hold is designed for legal search, not to restore massive amounts of enterprise data. The Recycle Bin is limited and short-term and can’t rewind an entire data estate after an incursion. These kinds of native features can serve specific use cases, but are not sufficient to address enterprise-grade needs. At worst, they provide a false sense of security.

Recovery needs to be fast, granular, and reliable at scale. That’s where Rubrik comes in.

Next-level Cyber Recovery & Resilience

According to The State of Ransomware report by Sophos, only 54% of affected companies impacted by ransomware relied on backups for data restoration, while nearly half of organizations chose a far more costly approach by paying the ransom to recover their data, highlighting a continued gap in effective cyber resilience practices.

The Rubrik/Sophos integration is designed to close this gap in several significant ways:

  • Immutable, secure backups: Rubrik will isolate backups from the Microsoft 365 tenant and protect them with air gap architecture, WORM-locked immutability, and customer-held encryption keys. Multi-factor authentication and intelligent data lock will help prevent tampering, even if credentials are compromised.
  • Fast, flexible recovery: Customers will be able to search and restore emails, files, folders, shared mailboxes, OneDrives, SharePoint sites, and Teams channels to the original location or another user. Rubrik will support both active and inactive accounts, and deliver high-performance restores using containers orchestrated with Azure Kubernetes Service.
  • Automated protection and compliance: Rubrik will automatically discover new users, sites, and mailboxes, apply policy-based protection using Entra ID groups, and offer delegated admin controls. Sophos Central makes this automated protection effortless to manage and will eliminate tedious backup tasks for overburdened admins.

This new functionality will be available within Sophos Central. No new interfaces to learn. No extra tooling. Just a unified experience for both security operations and Microsoft 365 data protection.

Building Cyber Resilience, Together

Working with Rubrik, Sophos will be able to give customers the tools they need to detect, protect, and recover with speed and precision if bad agents break into Microsoft systems. For partners, the Rubrik/Sophos integration will unlock new ways to support customers with an offering that directly aligns to the realities of today’s threat landscape.

Rubrik and Sophos share a commitment to helping organizations operate with confidence in the face of risk. Together, we’re raising the bar for Microsoft 365 resilience.

To learn more or activate the integration, contact your Sophos sales team or a representative.

Source: Sophos

19

Aug

Global Artificial Intelligence (AI) infrastructure spending is projected to surpass $200 billion by 2028, according to research from the International Data Corporation (IDC). As organizations rapidly deploy more complex AI systems, the demand for high-performance infrastructure, like Graphics Processing Units (GPUs) and AI accelerators, is surging. This growth exponentially increases computing power, energy consumption and data exchange across hybrid and cloud environments. However, this rapid expansion of AI infrastructure also increases cybersecurity risks.

Traditional security frameworks are falling short in reducing attack surfaces and securing privileged access. The future of AI requires a modern Privileged Access Management (PAM) solution to protect dynamic cloud environments.

The explosive growth of AI infrastructure

Enterprises are rushing to deploy larger and more powerful systems to keep up with the rapid speed of AI breakthroughs. At the center of this growth is a surge in demand for GPUs, which are crucial for training and running modern learning models. Most AI stacks are highly complex and require significant resources, prompting many cloud providers to invest heavily in AI-specific data centers that can process what traditional infrastructure can’t. Since these centers are designed to sustain advanced workloads, organizations require large amounts of computing power, leading to significant increases in energy consumption. Based on a report from the International Energy Agency (IEA), U.S. AI-specific data centers are expected to account for almost half of the country’s electricity demand growth through 2030 – consuming more energy than all energy-focused manufacturing sectors combined.

In addition to the complexity and energy consumption of AI infrastructure, modern AI stacks are deeply integrated into training pipelines, Application Programming Interfaces (APIs) and datasets, which must interact seamlessly across hybrid and cloud environments for optimal performance. As reliance on AI increases, organizations must maintain performance and scalability without jeopardizing their compliance or overall security posture.

Security risks in AI-driven environments

When AI infrastructure expands, so does the attack surface – the total number of entry points where an unauthorized user could access sensitive systems or data. Potential entry points, or attack vectors, include hardware, GPU clusters, software, APIs and endpoints that can be exploited in a cyber attack. One of the most at-risk attack vectors in AI infrastructure is privileged access.

Privileged users, such as engineers, IT administrators and DevOps teams, typically have elevated permissions across infrastructure used for provisioning and accessing data. If just one privileged account is compromised, cybercriminals can use it to access sensitive systems and even corrupt AI outputs.

Traditional perimeter security is no longer sufficient because relying solely on firewalls or network-based defenses cannot provide full visibility and access control. With a modern PAM solution in place, organizations can shift from traditional security methods to identity-centered security models that prioritize enforcing least-privilege accesssession monitoring and continuous validation of both human and non-human users through zero trust.

Why modern PAM is critical

As AI environments grow in size and complexity, a modern PAM solution is essential for securing both human and non-human identities. By implementing a PAM solution, organizations can ensure secrets aren’t hardcoded in scripts or exposed in configuration files. Unlike legacy PAM solutions that were built around traditional IT roles and static infrastructure, modern PAM solutions are designed to scale with cloud-native, AI-driven architectures. When a single compromised credential can lead to widespread access across an organization’s infrastructure, deploying a modern PAM solution gives organizations granular control over privileged access, improves visibility and reduces the attack surface.

To secure complex AI environments, modern PAM solutions deliver critical capabilities such as:

  • Just-in-Time (JIT) access: Grants privileged access only when necessary and for a limited duration, eliminating standing access.
  • Session monitoring and recording: Tracks all privileged sessions in real time and helps detect suspicious activity with detailed audit trails.
  • Secrets management: Securely stores, rotates and manages credentials and secrets used in AI pipelines.
  • Zero-trust security: Enforces continuous authentication for every user, device and session before granting access.

Securing the future of AI infrastructure with KeeperPAM

As organizations invest in AI, protecting privileged access must remain a top priority. Traditional PAM tools that once protected legacy systems are no longer able to keep up with the demands of AI environments, specifically regarding privileged access. While organizations focus on investing in AI innovation and training Large Language Models (LLMs), they must also invest in cybersecurity, as failure to control privileged access can compromise sensitive data and systems.

Luckily, KeeperPAM is built with the future in mind. Designed for high-performance, resource-intensive environments, KeeperPAM is a modern, cloud-native PAM solution that scales seamlessly alongside AI workloads.

Request a demo of KeeperPAM today to secure your organization and stay ahead of the risks in AI-driven environments.

Source: Keeper Security

15

Aug

Sophos MDR is the world’s most trusted MDR service, with hundreds of cybersecurity experts providing 24-7 monitoring, prevention, detection, and response to more than 30,000 organizations worldwide.

While Sophos MDR leverages telemetry from across our customers’ environments to detect and neutralize threats, one of the most significant advantages – and a key differentiator of the Sophos MDR service – is our deep integration with Microsoft 365 for all customers regardless of the Microsoft license they’re using.

This enables us to see and stop more threats faster, while increasing customers’ return on their Microsoft investments.

A tale of two APIs: Graph Security vs. Management Activity

Many MDR providers heavily rely on Microsoft’s Graph Security API, which provides strong detection value – but only for customers who have invested in a premium E5 license.

For the vast majority of customers using other Microsoft 365 licenses – such as Business Basic, Standard, or even Premium licenses – the Graph Security API provides minimal telemetry.

At Sophos, we take the distinct and highly effective approach of also extensively leveraging Microsoft’s Management Activity API, which provides rich audit logs from Exchange Online, SharePoint, and other Microsoft solutions.

Crucially, this API is available across nearly all Microsoft 365 license tiers, meaning even Business Basic customers benefit.

Better data, better outcomes

Sophos MDR ingests these logs and applies proprietary threat detection rules developed by our threat intelligence and engineering teams.

These aren’t “off the shelf” detections. They’re custom-built to identify high-risk scenarios such as session hijacking, phishing, business email compromise inbox rule creation, and credential-stuffing.

Faster responses, thousands of times over

This approach operates at scale, with several thousand confirmed threats surfaced each month from Microsoft data – threats that would otherwise go undetected without an E5 license.

Consider a typical scenario: a user clicks a phishing link, completes multi-factor authentication, and an attacker hijacks the session.

The attacker then creates hidden inbox rules to delete or redirect emails that would otherwise alert the user to suspicious activity such as invoice fraud.

Because the Microsoft Management Activity API sends all the Microsoft 365 audit logs to the Sophos data lake, Sophos detections are able to flag this behavior based on patterns learned from the audit logs – patterns such as multiple operating systems using the same session or known phishing kit indicators of compromise.

More than just detection

While our deep Microsoft integration is a prime example of how Sophos extends protective capabilities, we don’t stop at detection: Sophos MDR can respond natively within the Microsoft environment.

With the customer’s permission, Sophos MDR analysts can take immediate action to remediate threats in Microsoft 365.

Revoking sessions, blocking user sign-ins, and disabling malicious inbox rules – all without requiring customer interaction.

We conduct many hundreds of these automated response actions every month, with hundreds more executed manually when needed.

Learn more

Sophos brings unique, impactful, and rapid response capabilities to Microsoft environments, even for customers on Microsoft 365 basic license plans.

It’s better cybersecurity and a better return on investment.

Visit Sophos.com/MDR-Microsoft for more information.

Πηγή: Sophos

12

Aug

Sophos is proud to announce that we have been named a Leader in the 2025 Frost Radar™: Managed Detection and Response. This recognition is a testament to our relentless focus on innovation, stopping threats cold, and helping customers stay ahead in an ever-changing threat landscape.

Published by Frost & Sullivan, the Frost Radar is an industry benchmark that evaluates vendors on two dimensions: Innovation and Growth. This year’s report recognizes Sophos for its open-platform approach to MDR, unmatched incident response capabilities, and strong market momentum.

Supercharging this momentum is our acquisition of Secureworks and a sharp focus on AI, threat intelligence, and customer-driven innovation.

“Sophos’ acquisition of Secureworks represents one of the most important mergers in the history of MDR.”
— Frost & Sullivan, Frost Radar™: Managed Detection and Response, 2025

What makes Sophos a Leader?

Sophos MDR protects more than 30,000 organizations around the world, from lean IT teams to global enterprises. It’s a fully managed service that pairs powerful detection technologies with a world-class team of threat analysts and incident responders across seven global security operations centers. With 24/7 monitoring, threat hunting, and response across endpoint, network, cloud, and identity layers, Sophos MDR is built to adapt to what you need, regardless of whether you’re looking to fully outsource your SOC or strengthen your internal team with expert support.

There were several key factors that Frost noted which elevated Sophos into the top right of this year’s Radar:

Innovation that drives results

  • Open-platform visibility: Sophos MDR integrates natively with our own portfolio and with over 350 third-party tools, covering Microsoft 365, Google Workspace, and more.
  • Unlimited expert-led incident response: Included with the Sophos MDR Complete service tier, this provides peace of mind without caps or hidden fees.
  • AI-powered investigations: Our natural language AI assistant streamlines triage, case summaries, and provides recommendations.
  • CTEM-aligned services: Built-in capabilities for exposure management, threat intelligence, and proactive risk mitigation.
  • Secureworks opportunity: The acquisition brings in OT visibility, dark web monitoring, and threat intelligence from the Counter Threat Unit (CTU), all integrated into a unified platform.

Recent enhancements to Sophos MDR have sharpened our edge even further. In May 2025, we introduced expanded response actions for Microsoft 365 attacks, enabling MDR analysts to directly contain and remediate threats inside customer M365 environments. We also launched a strategic partnership with Capsule to help customers lower cyber insurance barriers by demonstrating observable MDR controls. Most recently, in July 2025, we unveiled Internal Attack Surface Management (IASM) as part of Sophos Managed Risk, giving organizations unprecedented visibility into vulnerable assets and misconfigurations inside their environment, and further aligning MDR with proactive security principles like CTEM.

Sophos MDR has also been recognized by those who matter most – our customers.

Sophos was recently named a “Customers’ Choice” vendor in the second Gartner® Peer Insights™ Voice of the Customer for Managed Detection and Response (MDR). G2, a major technology user review platform, also released its Summer 2025 Reports, and Sophos ranks as the No. 1 overall MDR solution.

Looking ahead

Being named a Leader in the Frost Radar™ validates the strength of our strategy, the depth of our capabilities, and the value we deliver to customers, but we won’t stop there.

We are committed to continuing our momentum and building the most intelligent, flexible, and integrated MDR platform on the market. Our goal remains the same: helping customers stay ahead of threats and build resilient, proactive security operations.

To learn more about Sophos’ recognition in the 2025 Frost Radar™ for Managed Detection and Response, read the full report here.

Source: Sophos

8

Aug

SE Labs has published its Q2 2025 Endpoint Protection report, and we’re delighted to share that Sophos Endpoint has once again received AAA ratings in the SE Labs Small Business and Enterprise protection tests.

We’ve consistently received AAA SE Labs test awards for the past three years by detecting and stopping real-world cyberattacks and simulated targeted attacks.

Here are the links to the latest reports: Endpoint Security: Small Business | Endpoint Security: Enterprise

The industry’s most sophisticated endpoint security solution

Sophos Endpoint, powered by Intercept X, takes a comprehensive, prevention-first approach to security, blocking threats without relying on any single technique. Multiple deep learning AI models secure against known and never-before-seen attacks.

Web, application, and peripheral controls reduce the customer’s threat surface and block common attack vectors. Behavioral analysis, anti-ransomware, anti-exploitation, and other advanced technologies stop threats fast before they escalate, so resource-stretched IT teams have fewer incidents to investigate and resolve.

Why testing matters

Reputable third-party testing is a crucial tool that enables organizations to make informed decisions about their technology stacks and security investments. However, as attacks increase in volume and complexity, meaningful results can only be achieved when the tests reflect organizations’ real-world realities.

SE Labs is one of the few security testers in the industry that simulates modern-day attack tools, tactics, techniques, and procedures (TTPs) currently used by cybercriminals and pen testers.

Sophos has been participating in their evaluations for many years, consistently receiving top scores in SE Lab’s endpoint security tests in both Enterprise and SMB categories.

SE Labs Awards

This award comes on the heels of winning four awards in this year’s SE LABS ® Awards 2025. The accolades – presented July 2nd in London – validate our commitment to protecting organizations of all sizes by delivering superior cybersecurity outcomes to our customers amid constantly evolving threats.

More accolades for Sophos Endpoint

Consistency is important! When helping an organization choose a security provider, it’s helpful to provide them with multiple viewpoints to help them make an informed decision. To see why customers choose Sophos, visit www.sophos.com/why for a summary of analysts’ views and reports, reputable third-party testing, and the opinions of customers and partners who use our products daily.

Source: Sophos

5

Aug

In 2024, we became one of the first organizations to commit to CISA’s Secure by Design initiative. Aligned with our core organizational values around transparency, Secure by Design has been a guiding force as we continually evaluate and improve our security practices.

We recently passed the one-year anniversary of publishing our pledges for improvement and would like to publicly share the progress we have made against the seven core pillars of the Secure by Design framework.

I’m proud of the progress we’ve made this year but, of course, plans change and we haven’t fully-realized every goal yet. So expect further updates and, very soon, a fresh set of additional commits for the year ahead.

Our pledges: A year in review

Multi-factor authentication (MFA)

Our 2024 pledge:

We pledge to release passkey support in Sophos Central and publish adoption statistics for this stronger MFA mechanism.

How did we do?

In November 2024, we launched passkey support to all customers using Sophos Central. This strategic step was aimed at enhancing authentication security through a phishing-resistant, passwordless login experience. Since its launch in December 2024, we’ve seen strong adoption, with over 20% of all authentications to Central now utilizing passkeys.

In addition to launching passkey support, we went a step further and now prevent the use of legacy MFA mechanisms such as SMS. Users of Central who rely on these legacy mechanisms are required to enrol in either a Time-based One-Time Password (TOTP) or passkey-based MFA during their next login.

Figure 1: Adoption of Sophos Central MFA mechanisms between December 2024 and July 2025

Default passwords

Our 2024 pledge:

We pledge to continue to disallow default credentials in all current and future products and services.

How did we do?

We have maintained this design principle and will continue to do so in our product development. Sophos products generate strong unique credentials, or require users to provide complex passwords upon setup, to help reduce the likelihood of unauthorized access.

Reducing entire classes of vulnerability

Our 2024 pledge:

In Sophos Firewall v21 (SFOS v21), we pledge to containerize key services related to Central management to add additional trust boundaries and workload isolation. Additionally, SFOS v22 will include an extensive architecture redesign, which will better containerize the Sophos Firewall control plane, further reducing the likelihood and impact of RCE vulnerabilities.

How did we do?

We are taking a risk-based prioritized approach to containerized workloads and have provided better workload isolation in the Sophos Firewall. Starting with the most important and exposed services, the releases of SFOS v21 and SFOS v21.5 included the first of these improvements . We will share details of the progress we are making with the Sophos Firewall control plane rearchitecture for SFOS v22 in a follow-up article, since it won’t be released until later in 2025.

Security patches

Our 2024 pledge:

Running the latest firewall firmware version offers additional security benefits beyond receiving security hotfixes by default. With this in mind, we pledge to release a feature by September 2025 that enables customers to automatically schedule Sophos Firewall (SFOS) firmware updates.

How did we do?

Sophos plans to include the ability to automatically schedule firmware updates with the release of SFOS v22 when it’s released later in 2025. Helping our customers keep their Sophos Firewall firmware up to date is a priority to us to help keep them secure. Currently, 99.41% of our customers’ firewalls benefit from automatically receiving OS-level hotfixes as they are released, thanks to the wide adoption of our automatic hotfix deployment feature.

Vulnerability disclosure policy

Our 2024 pledges:

  1. Increase transparency and add to collective industry knowledge by publishing blog posts that review findings and lessons learned from our vulnerability disclosure program

  2. Increase the maximum reward available to security researchers.

How did we do?

Since our last post in June 2024, we have continued to invest in our public bug bounty program and the great work that researchers share with us. This year alone we have reviewed more than 800 bug bounty submissions for Sophos products. We have rewarded over $500,000 USD to the researcher community since we started the program back in December 2017 . Today, Sophos ranks among the top Bugcrowd vendors offering the highest rewards per valid finding.

To help incentivize and increase the likelihood of finding critical vulnerabilities which could impact Sophos products, we have made a few key improvements this year which align to our pledges:

  1. We increased the maximum reward possible for our Windows Intercept X product by $20,000 USD; researchers can now earn $80,000 USD for a P1 submission
  2. We added a new reward which pays up to $50,000 USD for a P1 finding in Central
  3. We extended our premium bug bounty scope to include monetary rewards for valid vulnerabilities identified in Taegis and Redcloak, following Sophos’ acquisition of Secureworks earlier in 2025.

We have launched a new dedicated Root Cause Analysis (RCA) section on our Sophos Trust Center, where we have published RCAs from recent incidents. Additionally, we plan to share insights and lessons learned from our bug bounty program in a follow-up post later this year.

CVEs

Our 2024 pledge:

We pledge to extend our internal processes to consistently publish external CVEs for all identified internal vulnerabilities of a severity of high or critical in our products.

How did we do?

We have met this pledge by expanding our internal processes to ensure that any vulnerability identified internally and assessed as high or critical severity is prepared for external CVE publication. Although no vulnerabilities have yet been identified which meet this threshold for publication, the updated processes are fully in place and ready to support consistent and transparent disclosure going forward.

Transparently publishing CVEs for internally discovered issues helps our customers better understand the security posture of our products, supports informed decision-making, and reflects our commitment to industry best practices.

Evidence of intrusions

Our 2024 pledge:

We pledge to provide additional integration capabilities in Sophos Central to simplify the ingestion of audit logs into third parties, with target implementation prior to July 2025.

How did we do?

While we have made foundational progress toward this goal, we’ve had to adjust the timeline to reflect the significant organizational changes and new product opportunities resulting from our acquisition of Secureworks earlier in 2025.

We remain fully committed to this pledge and will continue to provide updates as we roll out improvements.

Next steps

Having reviewed our progress against the commitments we made last year, we’re now focused on the road ahead. In the near future, we’ll share the updated pledges we’re making for the coming year— building on what we’ve learned, where we’ve advanced, and where we still have work to do. Our mission remains the same: to continuously strengthen the security, transparency, and trustworthiness of our products, in alignment with the Secure by Design principles.

Source: Sophos

29

Jul

Sophos has been recognized for defending customers of all sizes against today’s complex cyberattacks, achieving four prestigious awards at the SE Labs Awards 2025.

We’re thrilled to announce that Sophos won four awards in this year’s SE LABS ® Awards 2025. The accolades – presented July 2nd in London – validate our commitment to protecting organizations of all sizes by delivering superior cybersecurity outcomes to our customers amid constantly evolving threats.

SE Labs Award for Enterprise Endpoint (Windows)

This award recognizes the most effective and reliable endpoint protection solution for enterprise environments running Microsoft Windows. Recipients have demonstrated superior threat detection, operational stability, and resilience against targeted attacks, verified through SE Labs’ independent testing framework.

SE Labs Award for Small Business Endpoint (Windows)

Tailored for the needs of smaller organizations, this award celebrates endpoint security products that provide strong out-of-the-box protection, ease of management, and robust real-world defense for Windows-based networks, without requiring enterprise-level resources to operate effectively.

SE Labs Award for Small Business Managed Service Provider Solution

With many small businesses relying on external partners to deliver cyber security expertise, this award highlights the top-performing products that are available to MSPs – products that deliver managed endpoint protection with clarity, efficiency, and measurable results. Winners have proven their capability to scale security services and respond rapidly to threats.

SE Labs Award for Small Business Security Innovator

Innovation is critical in an evolving threat landscape. This award recognizes a standout vendor or service provider pushing the boundaries of small business cyber security. Whether through breakthrough technology, creative service models, or agile threat response strategies, this honor is reserved for those reshaping the future of SME security.

Sophos Chief Research and Scientific Officer Simon Reed was present at the SE Labs Annual Awards ceremony to accept the awards.
Sophos Chief Research and Scientific Officer Simon Reed was present at the SE Labs Annual Awards ceremony to accept the awards.

The awards are judged based on a combination of continual public testing, private assessments, and feedback from SE Labs’ corporate clients.

“Behind every high performing security product is a team committed to excellence”, says Simon Edwards, Founder and CEO of SE Labs.”We believe that we should celebrate the technologies and teams pushing the boundaries in protection and resilience against cyber attacks. The standard of competition for the top place in each category has been very high this year and all of our winners are to be congratulated.”

Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. Sophos Endpoint defends more than 300,000 organizations worldwide against advanced attacks, with an AI-powered prevention-first approach, airtight ransomware protection against local and remote ransomware, adaptive defenses, and other innovative technologies. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops, protecting over 600,000 Sophos customers worldwide.

Why testing matters

Reputable third-party testing is an important tool to help organizations make informed decisions about their technology stack and security investments. However, as attacks increase in volume and complexity, meaningful results can only be achieved when the tests reflect organizations’ real-world realities.

SE Labs is one of the few security testers in the industry that simulates modern-day attack tools and tactics, techniques, and procedures (TTPs) that cybercriminals and penetration testers are currently using.

Sophos has been participating in their evaluations for many years, consistently receiving top scores in SE Labs’ endpoint security tests for enterprise and SMB.

It’s awards season

These awards follow Sophos’s recognition as a Customers’ Choice vendor in the 2025 Gartner® Peer Insights™ Voice of the Customer Reports for Endpoint Protection Platforms and Extended Detection and Response. This makes Sophos the only vendor to be named a Customers’ Choice in both reports, highlighting the comprehensive, robust protection of the Sophos platform.

Sophos has been named a Leader in the 2025 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) for the 16th consecutive time.

When helping an organization choose a security provider, it is helpful to provide them with multiple viewpoints to assist them in forming an opinion. To see why customers choose Sophos, navigate to www.sophos.com/why for a summary of analysts’ views and reports, reputable third-party testing, and the opinions of customers and partners who use our products daily.

Source: Sophos

25

Jul

Cybercriminals are getting faster at exploiting security gaps. The median dwell time observed by Sophos in the past year was a short two days.

Keeping pace with these agile threat actors leaves little room for forward thinking, but decisions made today will shape your organization’s ability to respond to tomorrow’s threats. The strategies below will help your organization build the right foundations for a cybersecurity program that stands the test of time.

1. Understand the threat landscape

From organized crime to hacktivists and state-sponsored actors, today’s threat landscape is complex and fast-moving. The starting point of a successful cybersecurity strategy is a deep understanding of this shifting threat landscape.

It’s only from here that you can appreciate your organization’s unique security gaps and take the right actions to bolster your defenses. But how do you stay up to date with an ever-changing threat landscape?

Ongoing vigilance

Understanding the threat landscape is a 24/7 endeavor, involving continuous monitoring and analysis of threat actor activity. Thankfully, organizations don’t have to go it alone. A trusted security partner can provide the expertise, processes, and technology to help organizations gain a better understanding of common attack vectors, techniques, and tactics, and how these are evolving in relation to your business.

Comprehensive visibility

To understand your risks in context and address them as they evolve, you need broad visibility across the attack surface. An open extended detection and response (XDR) platform will help you gain a holistic view of your systems, data, and processes and minimize the risk of threats slipping through the cracks.

Threat intelligence

Comprehensive intelligence is critical to a dynamic and resilient security posture, helping organizations anticipate and mitigate emerging threats. Effective threat intelligence systems leverage human expertise, AI, and analytics to analyze attack patterns and refine strategies continuously. Armed with actionable insights, forecasts, and recommendations, organizations can prepare for the worst — in the best way possible.

Sophos’ Active Adversary report shows the kind of intelligence that empowers our customers to continuously outpace and outmaneuver adversaries.

2. Look at threats in context

Context is key to understanding and applying what you learn from threat intelligence. Insights from intelligence, combined with relevant business information, provide the context you need to make informed decisions. After all, threats don’t happen in isolation.

They impact, and are influenced by, the unique environment in which your organization operates. This includes everything from business priorities, supply chain dependencies, and IT systems to regulatory challenges and socioeconomic issues. Contextualizing threats with insights on internal and external factors enhance your organization’s ability to anticipate and mitigate attacks.

Why context matters

  • Prioritize what matters most: Not all assets are created equal. Context is key to cutting through the noise and focusing time and resources where they’re needed most.
  • Develop targeted strategies: Deeper contextual understanding helps you identify high-risk areas and develop more precise mitigation strategies.
  • Apply technology wisely: Applying technology in context enhances efficiency and effectiveness. By tailoring tools and protocols to your specific needs and business conditions, it’s easier to prioritize threats and develop mitigation strategies.

3. Leave room for change

Cybercriminals are masters of reinvention, continuously changing tack to survive and thrive in hostile surroundings. Keeping pace — and getting ahead — means beating them at their own game with a cybersecurity strategy that’s as agile and adaptive as the threats you’re counteracting.

A security program with built-in flexibility and scalability will grow seamlessly with your business and stay constantly aligned with evolving conditions.

How to foster adaptability

  • Adopt agile technology and practices: Implement scalable solutions and agile methodologies to enhance responsiveness and drive continuous improvement in dynamic threat environments. Invest in training and resources that foster employee adaptability.
  • Use intelligence to get ahead: Leverage real-time intelligence to make more proactive and informed decisions. Adapt your policies, tools, and protocols based on data-driven insights so you can seamlessly pivot your defenses as new threats arise.
  • Share real-time insights for real-time adaptability: Keep employees continuously updated on emerging threats and tactics, so they’re able to better anticipate and adapt to risks. Share insights and best practices with partners and industry groups to gain a broader view of the threat landscape and proactively modify your defenses.

4. Don’t underestimate the human factor

Cybersecurity is as much about people as technology. Managing the risks and rewards of what makes us human is critical to cyber resilience.

On the one hand, human expertise adds a vital layer of security to your tech-based defenses. Conversely, when training and awareness are lacking, employees can quickly become a gateway to cyberattacks: 63% of organizations fell victim to ransomware due to lack of expertise/people according to Sophos’ State of Ransomware Report 2025.

Mitigating risk is essential, but not at the expense of human skills like problem-solving, collaboration, and resilience — all indispensable in a robust cybersecurity strategy.

How to manage human strengths and vulnerabilities

  • Mitigate human error: “To err is human” but the responsibility for mitigating this risk lies with organizations. Establish clear policies, multi-factor authentication (MFA), and consistent training to help reduce the risk of accidental missteps.
  • Nurture “people power”: Cultivate the uniquely human skills that help your people find creative solutions to complex problems. Empower employees with tools and resources that enhance their natural abilities. Organizations that invest in nurturing human talent will be better equipped to adapt to an evolving threat landscape.
  • Build a positive cybersecurity culture: Reinforce the importance of cybersecurity through peer influence and leadership buy-in. Reward positive outcomes and create a safe space where employees can report incidents without fear of reprisal.

5. Work on your speed and agility

Speed and agility are non-negotiable in today’s threat landscape as dwell times shorten and cybercriminals get increasingly creative.

Threat actors now have AI on their side, helping them to scale and strike faster — and they have the technology, infrastructure, and resources to continuously adapt and pivot. All of this increases pressure on organizations to detect and respond to threats with greater speed and agility.

How to stay ahead

  • Accelerate response times: Reduce the time it takes to detect and respond to a threat to minutes, not hours or days. Take advantage of industry-leading tools and expertise to automate workflows, speed analysis, and accelerate responses. Deploy technologies such as extended detection and response (XDR), endpoint detection and response (EDR), next-gen security information and event management (SIEM), and security orchestration, automation, and response (SOAR) tools. You can also extend your SOC team by partnering with a managed detection and response (MDR) provider that ensures 24/7 coverage.
  • Use AI and automation: Beat adversaries at their own game with AI-driven tools and automated systems. Spot anomalies faster and swiftly manage intrusions, automating routine tasks and using predefined playbooks.
  • Build flexible security frameworks: Use adaptive security tools with integrated real-time intelligence to quickly anticipate threats and modify strategies and protocols. Deploy solutions that integrate seamlessly with your existing systems to create a security framework that’s as proactive and dynamic as the threats you face.

As the threat landscape evolves with increasing speed and sophistication, so too must the strategies that secure your long-term mission. At Sophos, we help organizations future-proof their defenses with:

  • 24/7 security monitoring, detection, and response
  • Access to threat experts who can help respond to an active incident
  • Industry-leading threat intelligence
  • Flexible and scalable solutions
  • An open platform that integrates with your existing IT tech stack

With the right mix of technology, intelligence, and expertise, an uncertain future doesn’t have to be an unsafe one. Talk to our experts today to find out how we can help you build a resilient and adaptive cybersecurity strategy.

Source Sophos

22

Jul

Sophos is proud to announce that we have been named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, marking our 16th consecutive report as a Leader in this category.

Sophos is recognized as a Leader among a total of 15 endpoint protection (EPP), endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) vendors in this Gartner® Magic Quadrant™ report. The report provides readers with a comprehensive independent evaluation of the recognized solutions in this space.

In addition to this most-recent recognition, Sophos has also been named a “Customers’ Choice” vendor in the 2025 Gartner® Peer Insights™ Voice of the Customer Report for Endpoint Protection Platforms for the fourth consecutive year and in the inaugural Voice of the Customer Report for Extended Detection and ResponseThis makes Sophos the only vendor to be named a “Customers’ Choice” in both reports. We believe this highlights the comprehensive protection, detection and response capabilities delivered by the Sophos platform.

A Magic Quadrant Leader for the 16th consecutive report

Sophos has been recognized in the Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP) since the inaugural publication for this category in 2007. We believe this continued recognition reflects our dedication to delivering industry-leading protection for our customers and partners, and our sustained ability to keep organizations secure in the face of increasingly sophisticated threats. Achieving this recognition in the hyper-competitive endpoint security market for 16 consecutive reports demonstrates, in our opinion, Sophos’ focus on developing innovative solutions that evolve with the global threat landscape and the adversaries we are fighting every day.

Sophos and Secureworks: Unveiling the future of protection, detection, and response

Sophos completed its acquisition of Secureworks in February 2025, combining two leading and complementary portfolios to offer a comprehensive suite of solutions for small, midmarket and enterprise organizations. Secureworks Taegis XDR customers can use Sophos Endpoint powered by Intercept X to elevate their cyber defenses — at no additional charge — delivering both improved protection and return on investment. We believe the unique combination of Sophos Endpoint’s protection technologies and the powerful detection and response capabilities of our open AI-native XDR platform contributed to Sophos’ continued position as a Leader in this Gartner evaluation.

We have an exciting roadmap planned, with the further convergence of Sophos Central and Taegis XDR coming soon to provide customers with advanced detection and response tools, identity protection, an expanded range of technology integrations, and more.

The integration of Secureworks also adds a new Counter Threat Unit (CTU) to the Sophos X-Ops advanced threat response joint task force, further expanding the rich threat intelligence that informs all customers’ defenses. Backed by Sophos’ advanced security technologies and a broad network of intelligence contacts and partners, the CTU plays a critical role in identifying and tracking threat actors and analyzing anomalous activity, uncovering new attack techniques, threats, and major shifts in the threat landscape.

SecOps innovation and expertise — from our team to yours

​​Sophos’ technology is rooted in our unique prevention-first approach that reduces breaches, adapts defenses in response to an attack, and improves detection and response outcomes. Our commitment to innovation is, we believe, evidenced by our recognition as a Leader in this Gartner Magic Quadrant evaluation, and includes our continued focus on delivering a superior open AI-native security operations platform. Sophos has been pushing the boundaries of AI-driven cybersecurity for nearly a decade. AI technologies and human cybersecurity expertise work together to stop the broadest range of threats, with deep learning and generative AI capabilities embedded across Sophos products and services.

We extended our range of generative AI features in early 2025 with the new Sophos AI Assistant. Designed in partnership with Sophos’ frontline security analysts, Sophos’ AI-powered tools enable in-house security teams to benefit from real-world workflows and the experience of Sophos MDR experts. The Sophos AI Assistant isn’t just another AI tool — it’s expertise from the team behind the Sophos Managed Detection and Response service, distilled into an intelligent agent.

Sophos is honored to be recognized again as a Leader in this Gartner Magic Quadrant evaluation. We are committed to continuing to deliver industry-leading products and services that protect organizations from cyber threats, no matter where they are in their security journey.

Read the Gartner® Magic Quadrant™ report

To learn more about Sophos’ recognition in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, read the full report.

Source: Sophos

17

Jul

This week, we’re updating Sophos Central firewall management with a couple of important updates, including a new account health check feature and enhanced scalability and performance for partners managing large groups of customers.

The new account health check capability provides a framework that will be expanded over time to perform a variety of helpful assessments across your entire estate. We’re kicking off this new account health check capability with a firewall backup assessment.

Firewall Backup Health Check

This new assessment will review your firewalls under management for backup status and will:

  • Identify all firewalls in your estate that are not on a backup schedule
  • Automatically add a backup schedule for those firewalls not already on a schedule

This ensures all your firewalls are backing up regularly to Sophos Central so if you ever need a configuration backup for one of your devices, it’s only a few clicks away.

You will find a new widget for Firewalls under the Dashboards > Account Health Check area…

Scrolling down will show the new firewall backup assessment results, where you can choose to ignore the results, drill down to see which firewalls are missing backups, or fix them all automatically and assign a backup schedule.

You should see this new capability in Sophos Central next time you log in.

As mentioned, we will be adding more health check assessments over time for licensing, firmware, and more.

Scalability and performance enhancements for partners

Overall performance and scalability have been improved for partners managing large numbers of customers. Management should now be much easier for those partners managing thousands of firewall customers thanks to back-end optimizations and UI enhancements.

Source: Sophos

12

Jul

In Remote Support 25.1, BeyondTrust is reinforcing its core commitment to security, stability, reliability, and customer confidence. This release focuses on strengthening our foundation—delivering a smoother experience with enhanced stability and robust security updates.

Our top priority is to provide customers with the most secure and dependable remote access solution possible. To ensure maximum reliability, we prioritized a comprehensive security patch rollup, focused quality assurance (QA) efforts that include a full regression testing cycle, and key stability enhancements. Our goal: to empower your support teams to work with confidence, knowing they’re backed by the most secure and dependable remote access solution. These new features are designed to provide a smoother, more resilient experience, helping you operate with confidence and peace of mind.

We strongly recommend this update for all customers. Cloud customers will receive the update automatically. For on-prem deployments, the upgrade is available with just one click.

This release brings a series of security-forward enhancements and experience improvements, including:

  • Full patch rollup and regression testing: All Remote Support updates and patches are now thoroughly tested for stability and security in both cloud and on-prem environments via a strenuous patch rollup and regression testing cycle.
  • Improved version visibility: All maintenance releases and new patches are now visible in the Remote Support login window.
  • Real-time dashboard access: Greater visibility with more detailed session metrics, available across both on-prem and cloud deployments.
  • Jump client upgrade improvements: Smoother jump client upgrades and fewer disruptions with new reliability fixes.
  • Enhanced endpoint automation: Improved filters and job organization for better proactive IT.
  • UX/UI & performance refinements: A more intuitive user experience and smoother, more stable session performance.
  • Certified compatibility with the BeyondTrust Pathfinder Platform: Remote support now has certified compatibility with the BeyondTrust Pathfinder platform, bringing more secure authentication to your cloud deployments and smoother integration with the BeyondTrust ecosystem.

To maximize the effectiveness and security of your Remote Support deployment, we recommend the following practices. These are aligned with our broader commitment to helping customers secure access at every layer.

1. Keep Your Deployment Up to Date

  • For on-prem instances, enable “Apply Critical Updates Automatically” in the /appliance interface to simplify patching.
  • Upgrade to the latest version for access to the newest security improvements.

2. Strengthen Credential Management

  • Use the BeyondTrust Vault (included with every Remote Support deployment) to support discovery, rotation, and injection of credentials on up to 100k accounts.
  • Use an external authentication provider (ex. SAML) over local accounts.
  • Periodically review all active accounts on your appliance(s), especially those with admin privileges.
  • Deactivate those not in use, and rotate passwords at recurring intervals where possible.

3. Apply Least Privilege Principles

4. Review and Harden Network Configurations

  • Ensure that you are adhering to the network restriction best practices outlined in our documentation to prevent unauthorized access.
  • Integrate with a SIEM using one of our various middleware for session data, and regularly review to monitor changes and detect anomalies and suspicious activity.
  • Use outbound events to trigger alerts or log session activity in real-time.
  • Configure syslog to send all configuration changes and authentication events to your SIEM.

In summary, at BeyondTrust, we believe security is not a one-time feature—it’s a continuous commitment. With Remote Support 25.1, we’re delivering meaningful improvements that reflect this mindset, strengthening the foundation for secure, stable, and high-performing remote support. Whether you’re a long-time customer or evaluating your remote support strategy, this release is designed to help your teams operate with greater confidence and resilience.

We encourage all customers—especially those managing on-prem deployments—to update to the latest version and take advantage of the best practices outlined above to further fortify your environment.

Source: BeyondTrust

8

Jul

Cyber threats continue to evolve, and organizations must stay ahead by fortifying their defenses.

While external attack surface management (EASM) identifies vulnerabilities that could be exploited from outside the network, many organizations face an internal blind spot: hidden vulnerabilities within their environments.

40% of organizations hit by ransomware in the last year said that they fell victim due to an exposure they weren’t aware of. To address this challenge, Sophos Managed Risk is expanding its capabilities with Internal Attack Surface Management (IASM).

Why IASM matters

Without visibility into internal vulnerabilities, your organization risks leaving critical gaps in your security posture. Threat actors who gain access to the network often move laterally to exploit internal weaknesses.

The latest release of Sophos Managed Risk introduces unauthenticated internal scanning, which assesses a system from the perspective of an external attacker without user credentials or privileged access. This helps you identify and mitigate high-risk vulnerabilities, such as open ports, exposed services, and misconfigurations that are accessible and potentially exploitable by attackers.

Key features and benefits

  • Comprehensive vulnerability management: Regular automated scanning to identify weaknesses affecting assets within the network.
  • AI-powered prioritization: Intelligently determines which vulnerabilities pose the highest risk and need immediate attention, guiding your team to prioritize their patching and remediation efforts.
  • Industry-leading technology: Sophos leverages Tenable Nessus scanners to detect vulnerabilities inside the network and determine their severity.
  • The Sophos advantage: Unlike vendors that separate EASM and IASM into distinct products, Sophos provides an integrated managed service powered by leading Tenable technology and backed by the world’s leading MDR service.

Available now

The new IASM capabilities are available today for all new and existing Sophos Managed Risk customers, with no changes to licenses or pricing. Customers can immediately benefit from the extended coverage by deploying Tenable Nessus scanners and scheduling automated scans in their Sophos Central console.

Learn more

As the cybersecurity landscape grows more complex, internal visibility is essential to achieve a more resilient security posture. With Sophos Managed Risk, you can now close security gaps affecting internal and external assets and take a proactive approach to vulnerability management. Learn more at Sophos.com/Managed-Risk or speak with a security expert today.

Source: Sophos

4

Jul

Customers have spoken, and the results are in. G2, a major technology user review platform, has just released their Summer 2025 Reports, where Sophos Firewall was rated the #1 Firewall in the Overall Firewall Grid. This marks the 10th consecutive G2 Seasonal Report where Sophos Firewall is the top-ranked Firewall, dating back to G2’s Spring 2023 Reports. 

G2 rankings are based on independent, verified customer reviews on G2.com, the world’s largest software marketplace and peer-review platform. Additionally, Sophos Firewall was rated the #1 firewall in the Enterprise and Mid-Market grids. 

What Sophos customers are saying 

“The real time communication between endpoint and firewall allows automatic isolation of compromised devices, significantly reducing threat response time.” said a user in the Enterprise segment 

“What I like best about Sophos Firewall is its intuitive web interface and deep visibility into network traffic. The Security Heartbeat feature, which integrates with Sophos endpoints, provides real-time health status of connected devices” said a user in the Mid-Market segment 

“I am absolutely thrilled with the Sophos Firewall! It offers outstanding performance and security that far exceeds my expectations. The user interface is intuitive and easy to use, making management and configuration a breeze” said a user in the Mid-Market segment 

“The best thing about [Sophos Firewall is that it simply works. It’s been bombproof for us for years and years” said a user in the Small Business segment 

“We’ve been using Sophos Firewall for just over 10 years across multiple sites, and it has consistently delivered outstanding performance, visibility, and security. What makes Sophos stand out is its perfect balance of robust protection and user-friendly design” said a user in the Enterprise segment 

“Sophos Firewall offers a wide range of security features, including advanced threat protection, web filtering, VPN management. Sophos Firewall is a well-regarded solution for businesses looking for a robust and easy-to-manage security platform” said a user in the Mid-Market segment 

Why customers love Sophos Firewall 

Customers love that they get much more than a firewall, that allows them to consolidate their cybersecurity products and services with a single vendor and a single management console. This allows them to simplify and save on their cybersecurity: on products, services, licensing, support and management. 

They also love that Sophos Firewall gets better and faster with every release.  Our latest release introduces a new Network Detection and Response capability that’s a first in the industry and helps detect active threats operating on the network – before they can become a real problem. We’re also improving performance and protection with every release – at no extra cost. Check it out today. 

Source: Sophos

1

Jul

BeyondTrust continues to raise the standard for privileged access security. Version 25.1 of BeyondTrust Privileged Remote Access (PRA) delivers critical behind-the-scenes upgrades, doubling down on BeyondTrust’s mission to deliver the most dependable, secure privileged remote access platform on the market. This maintenance release focuses on providing stronger security, improved reliability, and more seamless control of privileged sessions.

Version 25.1 rolls up recent security patches, runs them through an exhaustive regression test suite, and layers in targeted stability improvements and key performance refinements for both cloud and on-prem environments.

This update is available whether you run a cloud or on-prem deployment of Privileged Remote Access. Cloud users receive updates automatically. On-prem customers can download and apply version 25.1 from the appliance console.

This release brings a series of security-forward enhancements and experience improvements to Privileged Remote Access, including:

  • Security patch rollup + rigorous testing: All PRA updates and patches have been thoroughly tested for stability and security in both cloud and on-prem environments. A strenuous patch rollup and regression testing cycle ensures consistency and delivers dependable performance across deployments.
  • Improved version visibility: Admins can now view a complete list of installed maintenance releases directly from the PRA login window, boosting visibility and compliance readiness.
  • Real-time dashboard access: Gain deeper insight into usage patterns, session activity, and system health across cloud and on-prem PRA deployments.
  • Smoother Jump client upgrades: Bug fixes and upgrade process refinements improve reliability during endpoint and Jump Client updates.
  • Enhanced endpoint automation: New filter and job organization options help streamline privileged task automation and improve proactive IT workflows.
  • Refined UX/UI & performance enhancements: Enjoy smoother performance and usability improvements that reduce friction across daily workflows.

Certified Pathfinder compatibility: PRA now officially integrates with the BeyondTrust Pathfinder platform, delivering more secure, seamless authentication across hybrid access environments and smoother integration with the BeyondTrust ecosystem.

Even the strongest tools benefit from smart configuration. Use these best practices to maximize the protection and control offered in Privileged Remote Access 25.1:

1. Patch Smart & Stay Current

  • On‑prem? Toggle “Apply Critical Updates Automatically” in /appliance to streamline patching.
  • Always run the latest build to inherit the newest hardening measures.

2. Lock Down Credentials

  • Use the built-in BeyondTrust Vault for secure credential discovery, rotation, and injection.
  • Prioritize SAML and other external identity providers.
  • Regularly audit admin accounts, disable any unused accounts, and rotate passwords proactively.

3. Apply Least Privilege with Precision

  • Set strict session and group policies to limit access to only what’s required.
  • Test policy configurations with the Session Policy Simulator before rollout.

4. Harden Your Network (Access) Layer

  • Follow the network restriction checklist to minimize external exposure and block unauthorized access.
  • Route session data to your SIEM via middleware and set up syslog and outbound event hooks for real-time monitoring.
  • Enable outbound event hooks for real-time alerts, and forward syslog data for every config change or auth event.

Security never stands still, which is why BeyondTrust is committed to delivering secure, intelligent remote access, where control is precise, visibility is clear, and protection is always evolving. Privileged Remote Access 25.1 reinforces BeyondTrust’s continuous improvement model by delivering practical, behind-the-scenes enhancements that translate into tangible confidence for your technicians and your auditors alike. Whether you’re defending internal infrastructure or enabling third-party access, PRA 25.1 delivers the trust and control modern security teams demand.

Already a customer? Upgrading keeps you on the safest, most stable footing. Upgrade now to benefit from the latest security and performance advancements.

Source: BeyondTrust

29

Jun

As organizations hurry to embrace AI and its many benefits, one challenge weighs heavily on CISO and security teams’ minds: how do you quickly and effectively secure these new capabilities?

Today, Silverfort introduces AI Agent Security, our latest innovation designed to empower CISOs to lead secure AI adoption by treating AI agents as identities—governed, visible, and protected with the same rigor applied to human users.

The emerging risk: AI agents left to their own devices 

Gone are the days when only the most experimental companies adopted AI. Now, as executives across industries demand AI integration, it’s a business-critical priority. But while productivity soars, so do new risks.

One area these risks abound is with the use of AI agents: software programs that perform tasks autonomously or on behalf of a human, often making decisions and taking actions based on context or input data. To perform these tasks, AI agents require a level of access to systems, resources and data—just like human users.

And that’s where the problem lies. AI agents exist in the grey area between human and non-human identities. They need a different type of protection, because current identity and access management (IAM) solutions simply weren’t built for machines who could make their own decisions. They lack visibility and effective governance capabilities for AI agents, leading to a substantial risk of misuse by threat actors, not to mention potential compliance violations and limited auditability.

This creates a visibility and control vacuum. CISOs, developers, identity teams, urgently need solutions that seamlessly connect AI agents’ identities and privileges to the human actors behind them to ensure full visibility, compliance, and risk management at the speed of innovation. Yet they are expected to secure a rapidly expanding AI ecosystem using tools that were never designed for it.

Against a backdrop where expertise is still emerging, the pressure to move quickly is high, and AI agent behavior is evolving every day, it’s easy to see why the task at hand might feel impossible.

Our vision: Securing AI agents starts with treating them as an identity 

Luckily, there’s a way forward. Our method for securing AI is built on a simple premise: AI agents must be treated as identities and they should be tied to a person. At the core of this is a new definition of who is doing the action: not just a username or token, but the combined identity of the human and the AI agent acting on their behalf.

With this identity-first approach, we can automatically discover, classify and monitor AI agent identities before applying dynamic access policies to each of them and, crucially, tying them to their human initiators. This means we can protect all involved with robust, real-time security controls and prevent attackers from using AI agents in lateral movement.

This allows you to put governance and boundaries around autonomous agents and pull humans into the loop when appropriate, while protecting all involved with robust security controls. Even better, our unique identity-first architecture allows for a single, end-to-end view of every AI agent and MCP server in action in your environments while being quick to deploy and implement. This means Silverfort can limit AI agent misuse, privilege escalations, and unauthorized actions in your environments within hours of deployment.

 

 

In short, Silverfort’s AI Agent Security product:

  • Discovers, classifies and monitors AI agents based on real-world behavior
  • Ties every action to a responsible human to ensure accountability
  • Enforces dynamic, least-privilege access policies tailored to each AI agent’s role
  • Provides comprehensive auditability, enabling compliance in a shifting regulatory landscape
  • Empowers organizations to securely adopt AI agents without requiring them to be AI experts
  • Deploys rapidly to prevent key identity security threats in your environment with minimal effort

It’s the first solution that uses this unique architecture to reimagine identity security specifically for AI, significantly reducing the complexity and time required to safely and compliantly adopt AI technologies. With AI Agent Security, AI adoption is no longer a security compromise, but a secure, scalable strategy.

Built for businesses, backed by Silverfort 

We’re just getting started. As the landscape evolves, Silverfort will continue to lead the way in pioneering technologies that help security leaders stay ahead of the curve.

We’re actively inviting Silverfort customers to become design partners and help shape the future of AI identity security. If you’re leading AI adoption and need to secure it fast, we want to work with you. Find out more and get a demo. 

Source: Silverfort

25

Jun

The sixth annual Sophos State of Ransomware report provides fresh insights into the factors that led organizations to fall victim to ransomware and the human and business impacts of an attack.

Based on insights from a vendor-agnostic survey of 3,400 IT and cybersecurity leaders across 17 countries whose organizations were hit by ransomware in the last year, the report combines year-on-year insights with brand new areas of study, including why ransom payments rarely match the initial demand, and the downstream impact of ransomware incidents on in-house teams.

Download the report to get the full findings and read on for a taste of some of the topics covered.

Why organizations fall victim to ransomware

It is rarely a single issue that leaves organizations exposed to ransomware; rather a combination of technological and operational factors contributes to organizations falling victim to attack.

Technical root causes

For the third year running, victims identified exploited vulnerabilities as the most common root cause of ransomware incidents, used to penetrate organizations in 32% of attacks overall. This finding highlights the importance of identifying and patching security gaps before adversaries can take advantage of them.

Compromised credentials remain the second most common perceived attack vector, although the percentage of attacks that used this approach dropped from 29% in 2024 to 23% in 2025. Email remains a major vector of attack, whether through malicious emails (19%) or phishing (18%).

Read the full report for insights into how attack vectors vary based on organization size.

Operational root causes

For the first time, this year’s report explores the organizational factors that left companies exposed to attacks. The findings reveal that victims are typically facing multiple operational challenges, with respondents citing 2.7 factors, on average, that contributed to them being hit by ransomware.

Overall, there is no single stand-out source, with the operational causes very evenly split across protection issues, resourcing issues, and security gaps.

Download the full report for a deeper dive, including insights into the individual factors behind these numbers, as well as a breakdown of operational challenges by company size and industry sector.

Recovery of encrypted data

The good news is that 97% of organizations that had data encrypted were able to recover it. Less encouraging is that data recovery through backups is at its lowest rate in six years.

Just under half (49%) paid the ransom and got their data back. While this represents a small reduction from last year’s 56%, it remains the second highest rate of ransom payments in the last six years.

Read the report to learn more about both data encryption rates and data recovery.

Ransoms: Demands and payments

There is good news on this front: both initial ransom demands and actual ransom payments dropped over the last year – largely driven by a reduction in the percentage of demands/payments of $5 million or more. While encouraging, it’s important to keep in mind that 57% of ransom demands and 52% of payments were for $1 million or more.

826 organizations that paid the ransom shared both the initial demand and their actual payment, revealing that they paid, on average, 85% of the initial ransom demand. Overall, 53% paid less than the initial ask, 18% paid more, and 29% matched the initial demand.

 

Read the full report to learn more, include details of why some organizations pay more than the demand and others are able to pay less.

The business and human consequences of ransomware

The data reveals that organizations are getting better at responding to attacks, reporting lower costs and faster recovery.

The average (mean) cost to recover from a ransomware attack (excluding any ransom payment) dropped by 44% over the last year, coming in at $1.53 million, down from $2.73 million in 2024. At the same time, over half of victims (53%) were recovered within a week, a significant jump from the 35% reported in 2024.

Having data encrypted in a ransomware attack has significant repercussions for the IT/cybersecurity team, with all respondents saying their team has been impacted in some way.

Read the report

Download the report to get the full findings together with recommendations on how to elevate your ransomware defenses based on the learnings from 3,400 organizations that fell victim in the last year. To learn more about how Sophos MDR and Sophos Endpoint Protection deliver world-leading ransomware protection, visit our website or speak with your Sophos adviser.

Source: Sophos

20

Jun

GigaOm, a renowned technology analyst firm, has recognized Keeper Security as the Overall Leader in Enterprise Password Management for the fourth year in a row. The GigaOm 2025 Radar Report for Enterprise Password Management highlights Keeper’s Privileged Access Management (PAM) solution, KeeperPAM®, which helps organizations secure passwords, credentials, secrets and connections to mitigate cyber risks and defend against internal and external threats. The report also highlights Keeper’s password protection capabilities and user-friendly software.

Report overview and key highlights

This GigaOm Radar report examines 15 of the top enterprise password management solutions and compares offerings against the capabilities (table stakes, key features and emerging features) and non-functional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading enterprise password management offerings and help decision-makers evaluate these solutions so they can make a more informed investment decision.

This is the fourth year that GigaOm has evaluated the enterprise password management space, and it is also the fourth year that Keeper Security has been named the Overall Leader. The report builds on previous analysis while considering how the market has evolved over the past year.

What sets Keeper apart

Unlike fragmented tools or limited vault-only solutions, Keeper delivers a zero-trust, zero-knowledge security architecture that secures all credentials – user and machine – from a single platform. Key advantages include:

  • Compliance-ready architecture with best-in-class security: FedRAMP and GovRAMP Authorized, FIPS 140-3 validated, with the longest-standing SOC 2 and ISO certifications in the industry.
  • Cross-platform compatibility: Access Keeper on desktop, mobile and browsers from any location on any device.
  • Fine-grained access controls and secure record sharing: Including time-limited access, one-time share and self-destructing record capabilities.
  • Seamless security integrations: Keeper works out of the box with passwordless authentication, SSO, SIEM, SDK, MFA and CI/CD applications.

Since the release of last year’s GigaOm report, Keeper has introduced a series of updates and new features for its platform. These include features such as Remote Browser Isolation and the Risk Management Dashboard, along with the official release of KeeperPAM, the next generation of Keeper’s Privileged Access Management (PAM) platform.

Additionally, Keeper has expanded both passkey and passwordless authentication functionalities, along with continuous UI/UX improvements to provide a cleaner, more accessible experience designed to reduce friction and increase productivity. These innovations reflect Keeper’s commitment to user-centric security, combining usability with powerful administrative controls.

Keeper evolves with the cyber landscape, integrating solutions and adding capabilities based on customer feedback and questions. Whether deployed as a standalone enterprise password manager or as part of Keeper’s broader security suite, the KeeperPAM platform adapts to meet the growing needs of organizations of all sizes.

Why password management matters

GigaOm’s 2025 report makes it clear: Passwords remain a critical vulnerability in today’s cybersecurity landscape. With users and organizations managing thousands of credentials, the risk of compromise through weak or reused passwords continues to rise. A modern enterprise password management platform like Keeper addresses these challenges by:

  • Enforcing strong password practices and visibility across the organization.
  • Protecting machine identities and secrets in developer and DevOps environments.
  • Enabling passwordless authentication to reduce risk and streamline access.
  • Offering centralized management and auditing for compliance and security teams.

As organizations mature their security posture, password management becomes a pillar that supports zero-trust frameworks, regulatory compliance and proactive risk reduction. Enterprise password management is more than just storing passwords; it’s about protecting access at scale, on every device, in every location.

Try Keeper for free

Protect your organization’s passwords, credentials and secrets with zero-trust and zero-knowledge security. Sign up for a free 14-day trial or reach out to our team to learn more.

Looking to secure your organization beyond password management? Learn more about KeeperPAM®

Strengthen your organization’s security posture by investing in a privileged access management solution that supports a zero-trust strategy. KeeperPAM is both zero trust and zero knowledge, which helps prevent unauthorized access and ensures that only the right users have the appropriate level of access. With features like endpoint privilege management, role-based access control, Just-in-Time (JIT) access and detailed auditing, monitoring and session recording, KeeperPAM helps your organization secure critical data and maintain tight controls over all infrastructure.

To learn more about how KeeperPAM can secure your organization with its zero-trust strategy, request a demo today.

Source: Keeper Security

17

Jun

Threat actors remain on the offensive, constantly expanding how they infiltrate organizations’ environments and inflict financial, operational, and reputational harm. Turning to a proven incident response provider for emergency services is essential when a threat actor strikes your business.

Sophos and Secureworks have built industry-leading incident response services designed to help customers in their hour of need with a rapid response to cyberattacks.

We are delighted to announce the general availability of Sophos Emergency Incident Response, the first service to combine the strengths of these two robust incident response practices into one converged offering.

Rapid remote and onsite support

When a cyber emergency strikes, there isn’t time to waste. You need quick action by experienced incident response personnel to assess and contain the threat, specialized skills to neutralize and eject the adversary, and an understanding of what happened and how to prevent it moving forward.

Sophos Emergency Incident Response delivers remote and onsite assistance to organizations experiencing a cyberattack or who believe they are a victim of threat actor activity. This service focuses on executing responses throughout all stages of the incident response lifecycle, from initial contact and investigation through iterative forensics and threat analysis, attack surface reduction, remediation activities, improvement recommendations, and detailed post-incident summary.

Fueled by threat intelligence and vast security expertise

Sophos Emergency Incident Response experts provide digital forensics, malware analysis, threat intelligence from the Counter Threat Unit research team – now part of Sophos X-Ops – and threat hunting to find and eliminate threats. We use cross-disciplinary subject matter experts (such as penetration testers and threat researchers) to ensure comprehensive risk mitigation and recovery, as well as fortification against future strikes.

Key features and benefits

  • Deploy vast expertise: The combined power of the Sophos and Secureworks incident responders – now part of one team – provides you with seasoned and accredited global incident responders experienced in common and uncommon cyber threat scenarios.
  • Reduce attack impact: Using our combined experience responding to attacks of all types, Sophos rapidly triages, contains, and neutralizes active threats and ejects adversaries from your environment to prevent additional damage.
  • Holistic incident response capabilities: Emergency Incident Response engagements include a range of capabilities and options, including remote and onsite technical support, incident command and advisory leadership, expert ransom negotiations, incident-specific threat intelligence, and threat hunting to dig out hidden details of the attack.
  • Understand the root cause and how to prevent it: You receive a detailed post-incident report that includes a root cause analysis, actions taken by our responders, an enriched summary of threat actor tactics, and recommendations to fortify resiliency, plus an executive summary for non-technical audiences.

Available now

Being able to respond to a cyberattack is critical. Sophos Emergency Incident Response replaces the existing Sophos Rapid Response service and is available now to help. Learn more at Sophos.com/Emergency-Response or contact the Sophos Emergency Incident Response team for immediate assistance.

Source: Sophos

12

Jun

Keeper Security, the leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, today announces that its zero-trust and zero-knowledge PAM solution, KeeperPAM, has won the Fortress Cybersecurity Award in the zero-trust security architecture category.

Presented by the Business Intelligence Group, the Fortress Cybersecurity Awards program honors the industry’s leading companies and professionals who are going beyond compliance to build and maintain secure systems and processes. Winners are selected based on innovation, measurable impact and commitment to security best practices.

Keeper adopted zero trust and zero knowledge as foundational design and architecture principles from day one, ensuring all contents of a user’s vault are protected with multiple layers of safeguards and encryption. KeeperPAM unifies enterprise password, secrets and connections management with endpoint privileged management, zero-trust network access and remote browser isolation in one platform. By combining these critical identity and access management components, Keeper delivers unparalleled visibility, security and control, while ensuring that compliance and audit requirements are easily met.

“The volume and complexity of threats facing organizations today is growing by the minute,” said Russ Fordyce, CEO of the Business Intelligence Group. “The winners of this year’s Fortress Cybersecurity Awards are not only keeping up – they’re setting the pace. We’re proud to honor Keeper Security for providing a platform that makes us all more secure.”

Recent high-profile breaches have demonstrated the devastating consequences of compromised privileged access, with attackers using these accounts to infiltrate networks and steal sensitive data. KeeperPAM addresses this challenge head-on by incorporating a zero-trust approach to validate every access request, ensuring only those with explicit authorization can access critical systems and resources.

“This recognition from the Business Intelligence Group demonstrates our team’s dedication to providing best-in-class cybersecurity software that empowers our customers to stay ahead of modern threats,” said Darren Guccione, CEO and Co-founder of Keeper Security. “We are honored to receive this award and remain committed to leading the future of privileged access management – delivering superior visibility, security, compliance, reporting and control across the entire enterprise.”

Trusted by leading federal agencies and thousands of organizations of all sizes, KeeperPAM’s zero-trust and zero-knowledge security architecture is unmatched in safeguarding information and mitigating the risk of cyber attacks and data breaches. KeeperPAM is compliant with a broad range of industry standards and regulations, including FedRAMP and GovRAMP Authorization, SOC 2 Type I and Type II attestation, FIPS 140-3 validation, ISO 27001, 27017 and 27018 certifications, as well as HIPAA and PCI-DSS, reducing the administrative burden of audit tracking and access management.

To learn more about Keeper’s award-winning PAM platform, please visit: https://www.keepersecurity.com/.

Source: Keeper Security

9

Jun

Keeper Security, the leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, today announces an update to its password management platform. Keeper’s upgraded One-Time Share feature enables bidirectional, single-use encrypted sharing between Keeper users and non-users, providing customers with a secure way of exchanging confidential information with their customers, vendors and partners.

The new bidirectional sharing feature builds upon the functionality of Keeper’s existing One-Time Share (OTS) feature. OTS is designed to securely share credentials and files with a selected recipient for one-time use. These shares are protected in transit by Keeper’s elliptic-curve and AES-256 cryptography and can only be decrypted locally on the recipient’s device. Once received, shared records automatically expire based on the sender’s specified time. Additionally, each share is restricted to a single device, allowing the recipient to access the shared data multiple times until it expires or the sender terminates the share — whichever occurs first.

Bidirectional One-Time Share is the latest step in our commitment to ensuring that all customers can simply and securely exchange confidential information with end-to-end encryption,” said Craig Lurey, CTO and Co-Founder of Keeper Security. “By adding bidirectional editing support, we add yet another layer of security to our users’ cyber defenses. We’re proud to be the first in the industry to add this capability and continue supporting our customers, first and foremost.

The bidirectional functionality update allows easier sharing between users and non-users of Keeper’s platform. Previously, users were able to send view-only external shares. Now, non-users can also exchange data with Keeper customers, offering end-to-end encryption for both parties. This powers the secure collection and exchange of confidential information such as documents and credentials – without having to use insecure email, text messages or instant messaging channels.

Users share records by selecting the desired record from their Keeper Vault and initiating a one-time share. The user can then customize the access settings and generate a secure, time-limited link. The recipient clicks the link to view the content, where they can upload, modify or comment as needed. Once the time limit is reached or access is revoked, the session ends permanently and the record is no longer accessible.

Organizations can use the bidirectional one-time share to facilitate operations such as:

  • Collaboration: Securely collect signed documents, feedback or sensitive files from clients, contractors and partners without needing them to create an account.
  • Vendor Requests: Request compliance documents or private credentials from third parties securely.
  • Internal Audits: Temporarily share and retrieve information with auditors or legal teams.

To learn more about Keeper’s new One-Time Share functionality, please visit our documentation portal.

Source: Keeper Security