Featured article

Steganography poses a significant threat in the world of cybersecurity, allowing adversaries to conceal data within everyday files.

Continue reading
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Introducing Glasswall Halo ICAP Server for real-time threat removal
Company news

Introducing Glasswall Halo ICAP Server for real-time threat removal

Glasswall is excited to announce the integration of our Content Disarm and Reconstruction (CDR) technology with the Internet Content Adaptation Protocol (ICAP).

Glasswall: avoid operational downtime with our minimal patch technology
Thought leadership
Threat analysis

Glasswall: avoid operational downtime with our minimal patch technology

Staying ahead of cybersecurity threats is a constant challenge. Traditional antivirus and security solutions require frequent patching or signature updates, which include information about new and emerging threats.

Raise the Bar sets high standards for Cross Domain Solutions - 5 key challenges for CDS vendors
Thought leadership

Raise the Bar sets high standards for Cross Domain Solutions - 5 key challenges for CDS vendors

Cross Domain Solutions (CDS) are used to securely transfer data between networks or systems with different security classifications. Vital to sectors including defense, finance, healthcare and critical infrastructure, they enable secure collaboration while maintaining strict controls that prevent unauthorized access or data leakage.

A Q&A with Glasswall’s Chris Wyman - Glasswall US sales director
Company news

A Q&A with Glasswall’s Chris Wyman - Glasswall US sales director

Let us introduce our US sales director Chris Wyman to you.

How Glasswall’s experts are tackling ‘concept drift’ in machine learning for malware detection
Threat analysis

How Glasswall’s experts are tackling ‘concept drift’ in machine learning for malware detection

Machine learning (ML) systems are trained on vast amounts of data, enabling them to make accurate predictions on future, unseen inputs. In dynamic environments like malware detection in cybersecurity, constantly evolving threats pose significant challenges that can hinder model performance.

What is sheep dipping? The cybersecurity pros, cons and optimization options
Thought leadership
Threat analysis

What is sheep dipping? The cybersecurity pros, cons and optimization options

In IT security, a sheep-dip is the process of using a dedicated device to test inbound files on removable media for viruses before they are allowed to be used with other computers.

Deploy Glasswall Halo via Google Kubernetes Engine (GKE)
Company news

Deploy Glasswall Halo via Google Kubernetes Engine (GKE)

We are excited to introduce our latest Helm chart deployment setup guide for Glasswall Halo via Google Kubernetes Engine (GKE).

Case study: Glasswall remediates breach at Government Research Centre
Threat analysis

Case study: Glasswall remediates breach at Government Research Centre

In the aftermath of a cyberattack, post-breach remediation is essential for organizations that need to mitigate damage and prevent any further exploitation of security vulnerabilities.

Safeguard your data: integrate Glasswall's CDR technology within Google Cloud Storage
Company news

Safeguard your data: integrate Glasswall's CDR technology within Google Cloud Storage

In today's digital landscape, data security is paramount. With the rise of cloud storage solutions like Google Cloud Storage, businesses are empowered with flexibility and scalability.

Embracing the 'shift left' approach in secure software development at Glasswall
SecOps

Embracing the 'shift left' approach in secure software development at Glasswall

The concept of "shifting left" has been integral to software development since testing expert Larry Smith introduced it in 2001, advocating for integrating the QA process earlier in the lifecycle. In the realm of security, this term has gained substantial traction, emphasizing the importance of incorporating security measures early in the Software Development Lifecycle (SDLC). But why do we shift left? And once shifted, how do we maintain that position? Why not just start left from the beginning?

Military-grade USB protection: How Hunna and Glasswall secure data in the field
Company news

Military-grade USB protection: How Hunna and Glasswall secure data in the field

Providing file-based cybersecurity protection while in the field is a major challenge faced by many government, military and intelligence agencies.

A Q&A with Glasswall’s Riyya Ahmed, Senior Technical Writer & Product Marketing Manager
Company news

A Q&A with Glasswall’s Riyya Ahmed, Senior Technical Writer & Product Marketing Manager

In the first of a regular blog series profiling female members of the Glasswall team, we talk to Riyya Ahmed, our Senior Technical Writer & Product Marketing Manager, about her career journey and what it’s like to work at Glasswall.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.