{"id":19534,"date":"2026-03-26T06:28:07","date_gmt":"2026-03-26T06:28:07","guid":{"rendered":"\/cybersecurity-blog\/?p=19534"},"modified":"2026-03-26T07:42:33","modified_gmt":"2026-03-26T07:42:33","slug":"global-infosec-awards-2026","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/","title":{"rendered":"ANY.RUN Recognized for Innovations and Market Leadership\u00a0at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026\u00a0\u00a0"},"content":{"rendered":"\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktolanding\">ANY.RUN<\/a> has been recognized at Global InfoSec Awards 2026 by Cyber Defense Magazine (CDM), the industry\u2019s leading electronic information security magazine. The award ceremony took place during RSAC\u2122 2026 conference.<\/p>\n\n\n\n<p>We&#8217;re&nbsp;especially&nbsp;proud and grateful that our impact for the industry has been&nbsp;acknowledged&nbsp;in two categories&nbsp;at once:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Innovative Malware Analysis for Sandbox<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Market Leader Threat Intelligence\u00a0<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p>This dual recognition reflects the approach to cybersecurity we&nbsp;prioritize:&nbsp;supporting&nbsp;the full SOC workflow&nbsp;by combining advanced&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware&nbsp;and phishing&nbsp;analysis<\/a>&nbsp;with integrated&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/reduce-soc-mttr-with-ti\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence.<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Made This Possible<\/strong>&nbsp;<\/h2>\n\n\n\n<p>As\u00a0highlighted\u00a0by the award founders\u00a0at CDM,\u00a0ANY.RUN\u00a0matched the values they looked for in\u00a0participants:\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\u201cANY.RUN\u00a0embodies three major features we judges look for to become\u00a0winners: understanding tomorrow\u2019s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help\u00a0mitigate cyber risk and get one step ahead of\u00a0the next breach.\u201d<\/p><cite>Gary S.\u00a0Miliefsky, Publisher of\u00a0Cyber\u00a0Defense\u00a0Magazine.\u00a0<\/cite><\/blockquote><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large.jpeg\" alt=\"\" class=\"wp-image-19560\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large.jpeg 1280w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large-300x169.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large-1024x576.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large-768x432.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large-370x208.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large-270x152.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Capture00278-Large-740x416.jpeg 740w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em style=\"text-align: start; white-space: normal;\">ANY.RUN&#8217;s CCO received the award at the Global InfoSec Awards,\u00a0RSAC conference\u00a0<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We believe that ANY.RUN\u2019s\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/g2-top-security-software-provider\/\" target=\"_blank\" rel=\"noreferrer noopener\">repeated\u00a0presence<\/a>\u00a0high\u00a0in industry rankings reflects its ability to address\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/soc-business-success-cases-anyrun\/\" target=\"_blank\" rel=\"noreferrer noopener\">operational challenges<\/a>\u00a0across the\u00a0investigation\u00a0cycle. Our solutions\u00a0support\u00a0enterprise security teams\u00a0as\u00a0they successfully:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unify\u00a0SOC Workflow:<\/strong>\u00a0ANY.RUN offers\u00a0a single\u00a0ecosystem\u00a0that streamlines\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-monitoring-ti-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">monitoring<\/a>,\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/fortune-500-enterprise-success-story\/\" target=\"_blank\" rel=\"noreferrer noopener\">triage<\/a>, and incident response without tool switching.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Accelerate Decision-Making:\u00a0<\/strong>Interactive malware analysis combined with contextual threat intelligence\u00a0delivers\u00a0immediate\u00a0insights,\u00a0no external double-checking needed.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scale\u00a0Operations for SOCs and MSSPs:\u00a0<\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/alert-enrichment-soc-performance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Standardized workflows<\/a>\u00a0and integrated intelligence\u00a0empower\u00a0teams of any size.\u00a0<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">36%<\/span> higher DR. <span class=\"highlight\">3\u00d7<\/span> stronger SOC performance.<br>Achieve more with ANY.RUN. \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=global_infosec_awards_2026&#038;utm_term=240326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nIntegrate for your team\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Community&nbsp;Trust in Numbers<\/strong>&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"349\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-1024x349.png\" alt=\"\" class=\"wp-image-19538\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-1024x349.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-300x102.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-768x262.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-1536x524.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-370x126.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-270x92.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17-740x252.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-at-09.25.17.png 2012w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN is used by SOC teams at companies and organizations worldwide<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN is used broadly by organizations with high security requirements, including the world\u2019s largest enterprises:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We support <strong>15,000+<\/strong> SOCs and <strong>600,000+<\/strong> analysts in accelerating investigations, reducing risk, and improving operational outcomes across industries.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>74%<\/strong> of <strong>Fortune 100 <\/strong>companies rely on ANY.RUN for malware analysis and threat investigation workflows.\u00a0\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>We&#8217;re&nbsp;deeply thankful for&nbsp;customers, partners, and community for their continued trust.&nbsp;We appreciate&nbsp;every contribution and&nbsp;piece of&nbsp;feedback&nbsp;and&nbsp;process them&nbsp;to&nbsp;maintain&nbsp;high&nbsp;standards&nbsp;we set for&nbsp;our&nbsp;solutions.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">Unify your SOC<\/span> with ANY.RUN.<br>Integrate for faster, smarter operations.\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=global_infosec_awards_2026&#038;utm_term=240326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nIntegrate ANY.RUN\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More on Global InfoSec Awards 2026&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p><strong>Global InfoSec Awards 2026\u00a0<\/strong>is\u00a0organized\u00a0by\u00a0Cyber Defense Magazine,\u00a0a\u00a0premier source of cyber security news and information for InfoSec professions in business and government.\u00a0<\/p>\n\n\n\n<p>With a&nbsp;mission&nbsp;is to share&nbsp;cutting-edge&nbsp;knowledge, real-world stories and awards on the best ideas, products, and services in the information technology industry,&nbsp;they deliver monthly magazines, as well as special editions&nbsp;for the&nbsp;RSAC Conferences.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>The award\u2019s judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company&nbsp;submitted&nbsp;materials on the website&nbsp;of each&nbsp;submission including but not limited to data sheets, white papers, product&nbsp;literature&nbsp;and other market variables.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About ANY.RUN<\/strong>&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN provides&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive malware analysis<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">actionable threat intelligence<\/a>&nbsp;that&nbsp;enable&nbsp;security teams worldwide to investigate threats faster, understand attacker behavior more clearly, and respond with greater confidence.&nbsp;<\/p>\n\n\n\n<p>We&nbsp;prioritize:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Maintaining\u00a0<a href=\"https:\/\/any.run\/compliance\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktocompliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II certification<\/a>\u00a0and commitment to protect customer data.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Constantly improving\u00a0Interactive Sandbox, Threat Intelligence Lookup, and\u00a0<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>\u00a0for support across monitoring, triage, and\u00a0response SOC processes.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Helping SOC and\u00a0<a href=\"https:\/\/any.run\/mssp\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026x&amp;utm_term=240326&amp;utm_content=linktomssp\" target=\"_blank\" rel=\"noreferrer noopener\">MSSP teams<\/a>\u00a0accelerate\u00a0analysis, gain deeper context during investigations, and\u00a0identify\u00a0emerging threats earlier.\u00a0<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN has been recognized at Global InfoSec Awards 2026 by Cyber Defense Magazine (CDM), the industry\u2019s leading electronic information security magazine. The award ceremony took place during RSAC\u2122 2026 conference. We&#8217;re&nbsp;especially&nbsp;proud and grateful that our impact for the industry has been&nbsp;acknowledged&nbsp;in two categories&nbsp;at once:&nbsp; This dual recognition reflects the approach to cybersecurity we&nbsp;prioritize:&nbsp;supporting&nbsp;the full SOC [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34],"class_list":["post-19534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Praised at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026<\/title>\n<meta name=\"description\" content=\"ANY.RUN won in two categories for innovative malware analysis and market-leading threat intelligence. More details\u00a0inside.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Recognized for Innovations and Market Leadership\u00a0at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026\u00a0\u00a0\",\"datePublished\":\"2026-03-26T06:28:07+00:00\",\"dateModified\":\"2026-03-26T07:42:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/\"},\"wordCount\":650,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/\",\"name\":\"ANY.RUN Praised at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-03-26T06:28:07+00:00\",\"dateModified\":\"2026-03-26T07:42:33+00:00\",\"description\":\"ANY.RUN won in two categories for innovative malware analysis and market-leading threat intelligence. More details\u00a0inside.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Recognized for Innovations and Market Leadership\u00a0at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Praised at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026","description":"ANY.RUN won in two categories for innovative malware analysis and market-leading threat intelligence. More details\u00a0inside.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Recognized for Innovations and Market Leadership\u00a0at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026\u00a0\u00a0","datePublished":"2026-03-26T06:28:07+00:00","dateModified":"2026-03-26T07:42:33+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/"},"wordCount":650,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/","url":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/","name":"ANY.RUN Praised at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-03-26T06:28:07+00:00","dateModified":"2026-03-26T07:42:33+00:00","description":"ANY.RUN won in two categories for innovative malware analysis and market-leading threat intelligence. More details\u00a0inside.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/global-infosec-awards-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Recognized for Innovations and Market Leadership\u00a0at\u00a0Global\u00a0InfoSec\u00a0Awards\u00a02026\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19534"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=19534"}],"version-history":[{"count":31,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19534\/revisions"}],"predecessor-version":[{"id":19572,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19534\/revisions\/19572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/19540"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=19534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=19534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=19534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}