Glasswall is excited to announce the integration of our Content Disarm and Reconstruction (CDR) technology with the Internet Content Adaptation Protocol (ICAP).
In an era where digital threats loom at every click, the Glasswall and Menlo Security integration provides a robust shield for your online activities.
Discover how AI is changing the cybersecurity landscape as we share a conversation with Glasswall’s Security Data Scientist, Dr. Aqib Rashid.
Data poisoning attacks: What are they and why do they matter?
So, you want to keep your organization secure from file-based threats, but don’t have the time to deal with complicated security deployments and can’t accept the protect gaps left by detection-based solutions? Don’t worry — we have you covered.
In the digital era, ransomware has evolved into a sophisticated and formidable threat to global cybersecurity. Recent insights from the UK’s National Cyber Security Centre (NCSC) and initiatives like the White House's International Counter Ransomware Initiative (CRI) highlight the complexity of this ongoing challenge.
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) added a new Adobe Acrobat Reader vulnerability to its catalog - CVE-2023-21608.
In today's complex cyber landscape, organizations must leverage multiple technologies to build robust defenses. A core element of many security strategies is sandboxing technology
...
Secure by Design is a software development approach that requires developers to continuously test, perform authentication safeguards and adhere to programming best practices from the very beginning of product development.
APIs (Application Programming Interfaces) play a crucial role in enabling communication between different software components or systems. Glasswall Halo allows customers to choose between either a synchronous or asynchronous API mode of operation.
Glasswall’s industry-leading Content Disarm and Reconstruction (CDR) technology enables security teams to quickly and effortlessly protect their organizations against file-based threats in a variety of different scenarios.
One such use case is the protection of AWS Amazon Simple Storage Service (S3) buckets, which are at high risk of malware attacks.
The quest for truly robust security is like hunting for the Holy Grail. For instance, security based solely on hardware offers huge potential to provide solutions that robustly protect a trust boundary. Yet, this has practical challenges, such as its potential to limit the processing of complex data structures, thereby affecting usability.
In recent weeks, a number of UK schools have been targeted by cybercriminals, with some serious incidents underlining the need for comprehensive cyber defenses. But what are the implications, and how worrying is the threat?