Featured article

Steganography poses a significant threat in the world of cybersecurity, allowing adversaries to conceal data within everyday files.

Continue reading
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How Glasswall’s experts are tackling ‘concept drift’ in machine learning for malware detection
Threat analysis

How Glasswall’s experts are tackling ‘concept drift’ in machine learning for malware detection

Machine learning (ML) systems are trained on vast amounts of data, enabling them to make accurate predictions on future, unseen inputs. In dynamic environments like malware detection in cybersecurity, constantly evolving threats pose significant challenges that can hinder model performance.

What is sheep dipping? The cybersecurity pros, cons and optimization options
Thought leadership
Threat analysis

What is sheep dipping? The cybersecurity pros, cons and optimization options

In IT security, a sheep-dip is the process of using a dedicated device to test inbound files on removable media for viruses before they are allowed to be used with other computers.

Deploy Glasswall Halo via Google Kubernetes Engine (GKE)
Company news

Deploy Glasswall Halo via Google Kubernetes Engine (GKE)

We are excited to introduce our latest Helm chart deployment setup guide for Glasswall Halo via Google Kubernetes Engine (GKE).

Case study: Glasswall remediates breach at Government Research Centre
Threat analysis

Case study: Glasswall remediates breach at Government Research Centre

In the aftermath of a cyberattack, post-breach remediation is essential for organizations that need to mitigate damage and prevent any further exploitation of security vulnerabilities.

Safeguard your data: integrate Glasswall's CDR technology within Google Cloud Storage
Company news

Safeguard your data: integrate Glasswall's CDR technology within Google Cloud Storage

In today's digital landscape, data security is paramount. With the rise of cloud storage solutions like Google Cloud Storage, businesses are empowered with flexibility and scalability.

Embracing the 'shift left' approach in secure software development at Glasswall
SecOps

Embracing the 'shift left' approach in secure software development at Glasswall

The concept of "shifting left" has been integral to software development since testing expert Larry Smith introduced it in 2001, advocating for integrating the QA process earlier in the lifecycle. In the realm of security, this term has gained substantial traction, emphasizing the importance of incorporating security measures early in the Software Development Lifecycle (SDLC). But why do we shift left? And once shifted, how do we maintain that position? Why not just start left from the beginning?

Military-grade USB protection: How Hunna and Glasswall secure data in the field
Company news

Military-grade USB protection: How Hunna and Glasswall secure data in the field

Providing file-based cybersecurity protection while in the field is a major challenge faced by many government, military and intelligence agencies.

A Q&A with Glasswall’s Riyya Ahmed, Senior Technical Writer & Product Marketing Manager
Company news

A Q&A with Glasswall’s Riyya Ahmed, Senior Technical Writer & Product Marketing Manager

In the first of a regular blog series profiling female members of the Glasswall team, we talk to Riyya Ahmed, our Senior Technical Writer & Product Marketing Manager, about her career journey and what it’s like to work at Glasswall.

Glasswall joins the Anti-Malware Testing Standards Organization (AMTSO)
Company news

Glasswall joins the Anti-Malware Testing Standards Organization (AMTSO)

We are thrilled to announce that Glasswall has officially joined the Anti-Malware Testing Standards Organization (AMTSO®).

Zero-trust file security - Why pen testers and red teams should champion CDR
Thought leadership

Zero-trust file security - Why pen testers and red teams should champion CDR

Offensive Security, also known as ethical hacking or penetration testing, is a proactive approach to cybersecurity that involves testing digital systems for vulnerabilities and weaknesses.

Guardians of the government – the battle to secure the public sector
Thought leadership

Guardians of the government – the battle to secure the public sector

The recent news that a payroll system used by the UK Ministry of Defence (MoD) had been hacked by a “malign actor” underlines the continuing cybersecurity risks facing government departments. In this case, the breach impacted...

Debunking the myths: understanding CDR and cybersecurity
Thought leadership

Debunking the myths: understanding CDR and cybersecurity

In the evolving world of cybersecurity, accurate information is crucial for making informed decisions to protect against new threats. As technology advances, so do the tactics used by cybercriminals...

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.