Featured article

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Guardians of the government – the battle to secure the public sector
Thought leadership

Guardians of the government – the battle to secure the public sector

The recent news that a payroll system used by the UK Ministry of Defence (MoD) had been hacked by a “malign actor” underlines the continuing cybersecurity risks facing government departments. In this case, the breach impacted...

Debunking the myths: understanding CDR and cybersecurity
Thought leadership

Debunking the myths: understanding CDR and cybersecurity

In the evolving world of cybersecurity, accurate information is crucial for making informed decisions to protect against new threats. As technology advances, so do the tactics used by cybercriminals...

Glasswall and Nexor announce strategic partnership to enhance cybersecurity across government and high-risk sectors
Company news

Glasswall and Nexor announce strategic partnership to enhance cybersecurity across government and high-risk sectors

As government, defense and intelligence agencies increasingly migrate to a cloud-first approach, they face a new information security challenge of protecting information flows.To address this growing priority, Glasswall and Nexor have announced a technology partnership today...

Efficiently automating DISA STIGS: a guide to automated STIG hardening with RKE2
SecOps
Company news

Efficiently automating DISA STIGS: a guide to automated STIG hardening with RKE2

In today's cybersecurity landscape, DISA STIGs are an increasingly popular implementation for organizations worldwide, including our clients, seeking robust security measures...

Zero-Day vulnerabilities – understanding their impact and how to protect against them
Thought leadership
Threat analysis

Zero-Day vulnerabilities – understanding their impact and how to protect against them

Among the many cybersecurity risks organizations face on a daily basis, zero-day vulnerabilities are particularly dangerous because – until they are patched – they are unknown to technology vendors and their users. In practical terms, because the software or device vendor has no advance warning of the risks they can create, they have zero days to develop a fix – hence the phrase ‘zero-day vulnerability’.

Glasswall joins D3IP collaboration community to share cybersecurity expertise with UK defence sector
Company news

Glasswall joins D3IP collaboration community to share cybersecurity expertise with UK defence sector

Glasswall has today joined the D3IP Community, an important UK initiative designed to foster collaboration and provide access to innovative technologies for the defence sector.

Glasswall partners with the University of Essex to boost protection for AI and ML systems against file-based threats
Company news

Glasswall partners with the University of Essex to boost protection for AI and ML systems against file-based threats

Glasswall has recently announced it is teaming up with the University of Essex as part of a brand-new knowledge transfer programme supported by funding from Innovate UK’s Accelerated Knowledge Transfer programme.

Delivering digital accessibility – Glasswall’s approach to online inclusivity
Company news

Delivering digital accessibility – Glasswall’s approach to online inclusivity

Digital accessibility has become a key consideration for organizations committed to creating fully inclusive products and services. The aim of any accessibility strategy should be to remove any barriers that prevent individuals with disabilities from effectively interacting with websites, digital tools and technologies.

Exploring secure software development at Glasswall: the fortification of container images
SecOps

Exploring secure software development at Glasswall: the fortification of container images

In the world of cybersecurity, stands as a critical line of defense against malicious content. By systematically analyzing and neutralizing potential threats within files, CDR technology ensures that only safe, sanitized content enters an organization's network.

Closing the firewall cybersecurity protection gap
Thought leadership

Closing the firewall cybersecurity protection gap

In recent years, the sheer variety and sophistication of cyber attacks have exacted a huge cost on individuals and organizations the world over. One recent study put the total global cost of cybersecurity incidents at a mind-boggling $8 trillion...

An inspiring story on International Women’s Day – Glasswall’s Lynn Randall
Company news

An inspiring story on International Women’s Day – Glasswall’s Lynn Randall

On International Women's Day 2024, we are profiling Lynn Randall, Glasswall's Company Secretary, who brings an inspiring story to this year's event. With a varied career spanning nearly half a century, she is ideally placed to share her insight about how the world of work has evolved for women, and how her own career change at the age of 50 offers an example to others.

The Morris II worm: a new AI threat shining a light on generative AI-powered application security shortfalls
AI
Thought leadership
Threat analysis

The Morris II worm: a new AI threat shining a light on generative AI-powered application security shortfalls

An international team, consisting of security researchers, has created a computer worm capable of automatic self-replication and targeting AI applications. It can compromise emails, distribute malware and steal data. Its name, Morris II

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.