Featured blog

Forbes Tech Council – The Rise Of Zero-Trust Cybersecurity In A Multi-Cloud World
The adoption of multi-cloud strategies is growing at a rapid pace across the public and private sectors. This approach allows organizations to use multiple cloud computing services within a heterogeneous architecture, providing them with flexibility, scale, and the...
Most recent
Celebrating CDR Innovation with the University of Essex
We recently attended the annual Celebration of Innovation event hosted by the University of Essex at their Colchester Campus. Bringing together up to 200 business leaders from across London and the South East with the University’s leadership, the event celebrates the...
UK Telecoms Providers Facing Tougher Cybersecurity Regulations
The global telecommunications industry has seen its fair share of serious cybersecurity breaches in recent years. In late September 2022, for example, Optus, a major telecoms provider in Australia, revealed that the personal data of 10 million customers had been...
How to protect your organization against file-based threats with Glasswall Desktop
So, you want to keep your organization secure from file-based threats, but don’t have the time to deal with complicated security deployments? Don’t worry — we have you covered. Glasswall Desktop offers unrivalled CDR (Content Disarm and Reconstruction) protection...
Dinis and Sam talk about the scalability of Glasswall CDR
Check out our new Q&A video, where Glasswall Chief Scientist Dinis Cruz and CRO Sam Hutton talk about the tremendous scalability of our CDR platform.
Why cybersecurity is important – Reputation
When cybersecurity breaches come to light, there’s an understandable focus on the financial impact. The subsequent FAQs often include: How much will it cost to get systems back online and repair the damage? What is this costing on a global level? And more recently,...
Welcome to Glasswall – new arrivals and exciting opportunities
Growth is a big part of the Glasswall message, and we’re delighted to welcome even more top talent to our UK and US teams. Our latest new arrivals include: Marc Robinson, our new Head of DevOps, who joins us having spent nearly eight years in various key architecture,...
US Cybersecurity Breach Rules – What’s New in 2022?
Cybersecurity breaches are severe and continue to make the headlines. Governments the world over are accelerating the rollout of new rules and regulations in an effort to prevent and mitigate the damaging attacks seen on a regular basis. In the US, for example, 2022...
NHS and Cisco among latest high-profile cybercrime victims
The ongoing disruption caused by the recent ransomware attack on the NHS raises serious – and familiar – concerns. According to reporting by the BBC, disruption to NHS 111 services “targeted the system used to refer patients for care, including ambulances being...
Why cybersecurity is important – Cost
The enormous cost associated with cyberattacks continues to hit the headlines. In recent weeks alone, T-Mobile has agreed to pay $500 million following a class action lawsuit connected to a cyberattack last year that exposed the personal data of over 76 million...
File-based cybersecurity breach leads to theft of $620 million in cryptocurrency
Axie Infinity – a blockchain-powered online game with over a million daily users worldwide – recently lost over $620 million in cryptocurrency following a security breach in which hackers used files infected with malware to gain access to the network of its publisher,...
Security Leader Q&A – Pete Gibson, former Chief Information Officer, Friendly’s Restaurant
As part of a series of Q&A discussions with senior security leaders, we spoke to Pete Gibson, former Chief Information Officer at Friendly’s Restaurant, whose responsibilities include protecting its 130 outlets across the U.S. Q - What are the biggest areas...
File-based threats and where to find them
Digital files are critical to any organization. They enhance productivity, aid learning and boost collaboration. However, they are the Achilles heel of most organizations’ cybersecurity defenses. They can be used as an invisibility cloak where cybercriminals hide...
Most read
Latest Glasswall Cartoon

Try Glasswall CDR
We’re offering two freemium solutions to help you try out our Content Disarm and Reconstruction (CDR) technology. Experience the power of Glasswall CDR yourself!