Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

82% of Attacks Skip Malware Entirely

27 seconds. That’s how fast an adversary can move to your critical systems. In this clip, you’ll learn: How adversaries blend in using everyday admin tools Why traditional, reactive security models fall behind What makes modern intrusions so hard to detect Watch the full video to see how teams are shifting to proactive hunting.

EU AI Act Compliance: Requirements, Risks, and What to Document

→ Audit your AI systems against EU AI Act requirements now — validate Annex IV technical documentation, logging, and data governance. The initial August 2025 compliance date has passed, and full penalties begin in August 2026. → Build a continuous compliance evidence chain — document risk management across the full lifecycle (design, development, deployment, and post-market monitoring).

AV-TEST gives Acronis Cyber Protect Cloud their top score in February 2026 evaluation

Acronis Independent testing continues to matter because security teams need more than vendor claims — they need repeatable, third-party validation under realistic conditions. That is why the latest AV-TEST results for business Windows endpoint protection stand out for Acronis.

Sophos Firewall: Configuration Studio

An overview of the new Sophos Firewall Configuration Studio, the newest version of the Firewall Configuration Viewer. This standalone, browser-based tool converts firewall configurations into a clear, human-readable format, enhancing your viewing, auditing, documentation, and comparison capabilities. All data is processed locally, so your information remains 100% private. Ask questions and get expert answers in the Sophos Community.

Exposure Summary Agent: Demo Drill Down

Vulnerability data is often fragmented, leaving security teams to interpret scattered details across sources. Without clear context, patching decisions are driven by severity scores instead of actual risk. In this demo drill down, we showcase the Exposure Summary Agent within Falcon Exposure Management. You’ll see how AI-enhanced vulnerability descriptions consolidate exploit methods, affected systems, and attacker intent into a single, structured view—eliminating the need to piece together raw data.

See Falcon Secure Access in Action

Adversaries are targeting the browser — hijacking sessions, stealing credentials, and exploiting gaps traditional tools can’t see. Watch how CrowdStrike's Falcon Secure Access delivers zero trust runtime protection directly in the browser, combining secure access with deep, real-time visibility and control over user activity. Subscribe and stay updated!

"What are wheels without an engine?"

At, George Kurtz and Dan Ives used a racing analogy to break down AI and cybersecurity. “The engine is the data… we are creating the data,” George explained. “If you’re a net data creator… you have a massive advantage.” In an AI-driven world, there will be two types of companies: those that create proprietary data and those that don’t.

Understanding how attackers think & how you avoid threats with Terry Bradley, Mile High Cyber [311]

Terry Bradley, Founder and President of Mile High Cyber, shares how you can uncover vulnerabilities and strengthen your organization's defenses with expert penetration testing and security assessments.