{"id":3958,"date":"2021-11-09T14:04:50","date_gmt":"2021-11-09T13:04:50","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=3958"},"modified":"2021-11-09T14:06:49","modified_gmt":"2021-11-09T13:06:49","slug":"sophos-releases-the-2022-threat-report","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/11\/resources\/sophos-releases-the-2022-threat-report\/","title":{"rendered":"Sophos Releases the 2022 Threat Report"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3959 alignright\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/11\/sophos-2022-threat-report-cover.jpg\" alt=\"\" width=\"275\" height=\"216\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/11\/sophos-2022-threat-report-cover.jpg 470w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/11\/sophos-2022-threat-report-cover.jpg?resize=300,236 300w\" sizes=\"auto, (max-width: 275px) 100vw, 275px\" \/>The Sophos 2022 Threat Report explores this year\u2019s key cybersecurity developments and their implications for the year ahead.<\/p>\n<p>With insights and analysis from Sophos security researchers and threat hunting experts, it provides a unique, three-dimensional review of the cyberthreat landscape.<\/p>\n<h3>Topics covered include:<\/h3>\n<ul>\n<li>The shift in the\u00a0<strong>ransomware-as-a-service model<\/strong>\u00a0and how it has changed the security landscape<\/li>\n<li>The growth of\u00a0<strong>extortion-style attacks<\/strong><\/li>\n<li>How malware families have switched their\u00a0<strong>business model<\/strong>\u00a0to deliver payloads more effectively<\/li>\n<li>The impact of the\u00a0<strong>misuse of \u2018threat emulation\u2019 tools<\/strong><\/li>\n<li>The evolving role of\u00a0<strong>AI and machine learning in cybersecurity<\/strong><\/li>\n<li>How the latest malware\u00a0<strong>targets mobile devices<\/strong><\/li>\n<\/ul>\n<p>Use the report to demonstrate the breadth of Sophos&#8217; cybersecurity expertise.<\/p>\n<h3>Key assets include:<\/h3>\n<ul>\n<li><strong>Sophos 2022 Threat Report<\/strong>\u00a0\u2013 Download the report directly from the Sophos Partner Portal.<\/li>\n<li><strong><a href=\"https:\/\/www.sophos.com\/en-us\/labs\/security-threat-report.aspx\" target=\"_blank\" rel=\"noopener\">Website<\/a><\/strong>* \u2013 Main page to send people to get the PDF with just one click. Please note that this page does not require completion of a form to download the full report.<\/li>\n<li><strong>Slide Deck (PowerPoint)<\/strong>\u00a0\u2013 Ideal for your own webcasts and sales presentations. Covers the key trends outlined in the report.<\/li>\n<li><strong>Promotional email<\/strong>\u00a0\u2013 Designed to promote the report.<\/li>\n<li><strong><a href=\"https:\/\/vimeo.com\/643579643\/d99c8bcf72\" target=\"_blank\" rel=\"noopener\">Video<\/a><\/strong>\u00a0\u2013 A presentation of the headline findings by Chester Wisniewski.<\/li>\n<li><strong>Social Media Tiles<\/strong>\u00a0\u2013 Images to support your social media activities.<\/li>\n<\/ul>\n<p><a class=\"btn btn-blue margin-20\" href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?collectionId=32034\" target=\"_blank\" rel=\"noopener\">Access Asset Library on the Sophos Partner Portal<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>We covered findings from this year\u2019s 2022 Threat Report in various blog stories. Share these with your prospects as a proof why good cybersecurity solutions are more important than ever:<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/news.sophos.com\/en-us\/winners-and-losers-in-the-ransomware-turf-wars\" target=\"_blank\" rel=\"noopener\">Sophos News Article<\/a><\/strong>* \u2013 Opinion piece by Chester Wisniewski, principal research scientist at Sophos, on the ransomware turf wars.<\/li>\n<li><strong><a href=\"https:\/\/nakedsecurity.sophos.com\/2022-threat-report\" target=\"_blank\" rel=\"noopener\">NakedSecurity Article<\/a><\/strong>* \u2013 Detailed introduction to the report.<\/li>\n<li><strong><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/09\/2022-threat-report\/\" target=\"_blank\" rel=\"noopener\">SophosLabs Uncut Article<\/a><\/strong>*\u2013 Recapping the report sections.<\/li>\n<\/ul>\n<p><em>*Don\u2019t forget to add your\u00a0<a href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?collectionId=11912\" target=\"_blank\" rel=\"noopener\">Lead Referral ID<\/a>. There are no forms required to download the Sophos 2022 Threat Report but in case prospects come back to complete any other form on\u00a0<a href=\"https:\/\/www.sophos.com\/\" target=\"_blank\" rel=\"noopener\">www.sophos.com<\/a>, you will own those leads.<\/em><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An in-depth analysis of the events that transpired in 2021, how they will help shape the threat landscape in 2022 and beyond, and promotional materials to help you educate your customers.<\/p>\n","protected":false},"author":8,"featured_media":3000003959,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[132,21],"coauthors":[63],"class_list":["post-3958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-sophos-threat-report","tag-threats-malware"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/11\/sophos-2022-threat-report-cover.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=3958"}],"version-history":[{"count":5,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3958\/revisions"}],"predecessor-version":[{"id":3965,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3958\/revisions\/3965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=3958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=3958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=3958"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=3958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}