Featured article

Glasswall hasannounced a major technology integration with ReversingLabs, the most trusted file and networkintelligence repository provider, to further strengthen its threat removalsolution with an additional layer of pragmatic security.

Continue reading
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Morris II worm: a new AI threat shining a light on generative AI-powered application security shortfalls
AI
Thought leadership
Threat analysis

The Morris II worm: a new AI threat shining a light on generative AI-powered application security shortfalls

An international team, consisting of security researchers, has created a computer worm capable of automatic self-replication and targeting AI applications. It can compromise emails, distribute malware and steal data. Its name, Morris II

The impact of AI on cybersecurity – opportunities and risks
Thought leadership

The impact of AI on cybersecurity – opportunities and risks

In an era where cyber threats evolve as rapidly as the technology designed to counter them, Artificial Intelligence (AI) has quickly emerged as a major force in the future direction of both good and bad actors.

10 reasons why you need Content Disarm and Reconstruction
Thought leadership

10 reasons why you need Content Disarm and Reconstruction

In the contemporary digital landscape, organizations face an ever-increasing challenge of protecting their digital assets from a variety of file-based cybersecurity threats.

Glasswall's commitment to the Armed Forces Covenant
Company news

Glasswall's commitment to the Armed Forces Covenant

Glasswall is proud to support the UK Armed Forces community by signing the Armed Forces Covenant.

AI in Cybersecurity: Key insights from Glasswall's Security Data Scientist, Dr. Aqib Rashid
Thought leadership

AI in Cybersecurity: Key insights from Glasswall's Security Data Scientist, Dr. Aqib Rashid

Discover how AI is changing the cybersecurity landscape as we share a conversation with Glasswall’s Security Data Scientist, Dr. Aqib Rashid.

Defending the future: a guide to fortifying AI against data poisoning attacks
Thought leadership

Defending the future: a guide to fortifying AI against data poisoning attacks

Data poisoning attacks: What are they and why do they matter?

How to protect your organization against file-based threats with Glasswall Meteor 
Company news

How to protect your organization against file-based threats with Glasswall Meteor 

So, you want to keep your organization secure from file-based threats, but don’t have the time to deal with complicated security deployments and can’t accept the protect gaps left by detection-based solutions? Don’t worry — we have you covered.

Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection
Thought leadership
Threat analysis

Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection

In the digital era, ransomware has evolved into a sophisticated and formidable threat to global cybersecurity. Recent insights from the UK’s National Cyber Security Centre (NCSC) and initiatives like the White House's International Counter Ransomware Initiative (CRI) highlight the complexity of this ongoing challenge.

Protecting against Adobe’s Zero Day Vulnerability CVE-2023-21608
Threat analysis

Protecting against Adobe’s Zero Day Vulnerability CVE-2023-21608

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) added a new Adobe Acrobat Reader vulnerability to its catalog - CVE-2023-21608.

The power of proactive security: understanding Sandboxing and Zero-Trust CDR
Thought leadership
Threat analysis

The power of proactive security: understanding Sandboxing and Zero-Trust CDR

In today's complex cyber landscape, organizations must leverage multiple technologies to build robust defenses. A core element of many security strategies is sandboxing technology

...

Secure by design: Content Disarm and Reconstruction technology
Thought leadership

Secure by design: Content Disarm and Reconstruction technology

Secure by Design is a software development approach that requires developers to continuously test, perform authentication safeguards and adhere to programming best practices from the very beginning of product development.  

Synchronous vs Asynchronous APIs: discover the deployment mode that's right for you
Company news
SecOps

Synchronous vs Asynchronous APIs: discover the deployment mode that's right for you

APIs (Application Programming Interfaces) play a crucial role in enabling communication between different software components or systems. Glasswall Halo allows customers to choose between either a synchronous or asynchronous API mode of operation.