Steganography poses a significant threat in the world of cybersecurity, allowing adversaries to conceal data within everyday files.
Machine learning (ML) systems are trained on vast amounts of data, enabling them to make accurate predictions on future, unseen inputs. In dynamic environments like malware detection in cybersecurity, constantly evolving threats pose significant challenges that can hinder model performance.
In IT security, a sheep-dip is the process of using a dedicated device to test inbound files on removable media for viruses before they are allowed to be used with other computers.
We are excited to introduce our latest Helm chart deployment setup guide for Glasswall Halo via Google Kubernetes Engine (GKE).
In the aftermath of a cyberattack, post-breach remediation is essential for organizations that need to mitigate damage and prevent any further exploitation of security vulnerabilities.
In today's digital landscape, data security is paramount. With the rise of cloud storage solutions like Google Cloud Storage, businesses are empowered with flexibility and scalability.
The concept of "shifting left" has been integral to software development since testing expert Larry Smith introduced it in 2001, advocating for integrating the QA process earlier in the lifecycle. In the realm of security, this term has gained substantial traction, emphasizing the importance of incorporating security measures early in the Software Development Lifecycle (SDLC). But why do we shift left? And once shifted, how do we maintain that position? Why not just start left from the beginning?
Providing file-based cybersecurity protection while in the field is a major challenge faced by many government, military and intelligence agencies.
In the first of a regular blog series profiling female members of the Glasswall team, we talk to Riyya Ahmed, our Senior Technical Writer & Product Marketing Manager, about her career journey and what it’s like to work at Glasswall.
We are thrilled to announce that Glasswall has officially joined the Anti-Malware Testing Standards Organization (AMTSO®).
Offensive Security, also known as ethical hacking or penetration testing, is a proactive approach to cybersecurity that involves testing digital systems for vulnerabilities and weaknesses.
The recent news that a payroll system used by the UK Ministry of Defence (MoD) had been hacked by a “malign actor” underlines the continuing cybersecurity risks facing government departments. In this case, the breach impacted...
In the evolving world of cybersecurity, accurate information is crucial for making informed decisions to protect against new threats. As technology advances, so do the tactics used by cybercriminals...