Featured article

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection
Thought leadership
Threat analysis

Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection

In the digital era, ransomware has evolved into a sophisticated and formidable threat to global cybersecurity. Recent insights from the UK’s National Cyber Security Centre (NCSC) and initiatives like the White House's International Counter Ransomware Initiative (CRI) highlight the complexity of this ongoing challenge.

Protecting against Adobe’s Zero Day Vulnerability CVE-2023-21608
Threat analysis

Protecting against Adobe’s Zero Day Vulnerability CVE-2023-21608

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) added a new Adobe Acrobat Reader vulnerability to its catalog - CVE-2023-21608.

The power of proactive security: understanding Sandboxing and Zero-Trust CDR
Thought leadership
Threat analysis

The power of proactive security: understanding Sandboxing and Zero-Trust CDR

In today's complex cyber landscape, organizations must leverage multiple technologies to build robust defenses. A core element of many security strategies is sandboxing technology

...

Secure by Design: Content Disarm and Reconstruction technology
Thought leadership

Secure by Design: Content Disarm and Reconstruction technology

Secure by Design is a software development approach that requires developers to continuously test, perform authentication safeguards and adhere to programming best practices from the very beginning of product development.  

Synchronous vs Asynchronous APIs: discover the deployment mode that's right for you
Company news
SecOps

Synchronous vs Asynchronous APIs: discover the deployment mode that's right for you

APIs (Application Programming Interfaces) play a crucial role in enabling communication between different software components or systems. Glasswall Halo allows customers to choose between either a synchronous or asynchronous API mode of operation.

Integrate Glasswall’s CDR technology into Amazon S3
SecOps
Company news

Integrate Glasswall’s CDR technology into Amazon S3

Glasswall’s industry-leading Content Disarm and Reconstruction (CDR) technology enables security teams to quickly and effortlessly protect their organizations against file-based threats in a variety of different scenarios.

One such use case is the protection of AWS Amazon Simple Storage Service (S3) buckets, which are at high risk of malware attacks.

Boost your Hardsec deployments with turbocharged, zero-trust CDR file protection
Thought leadership

Boost your Hardsec deployments with turbocharged, zero-trust CDR file protection

The quest for truly robust security is like hunting for the Holy Grail. For instance, security based solely on hardware offers huge potential to provide solutions that robustly protect a trust boundary. Yet, this has practical challenges, such as its potential to limit the processing of complex data structures, thereby affecting usability.

Raise the Bar Sets High Standards for Cross Domain Solutions - 5 Key Challenges for CDS Vendors
Thought leadership

Raise the Bar Sets High Standards for Cross Domain Solutions - 5 Key Challenges for CDS Vendors

The threat landscape facing organizations and government departments is ever-growing. President Biden’s Executive Order on Improving the Nation’s Cybersecurity gave the NSA’s National Cross Domain Strategy and Management Office (NCDSMO) greater authority to stipulate the criteria CDS vendors must meet.

Defending Education: UK Schools Confront Surge in Cyber Attacks
Thought leadership
Threat analysis

Defending Education: UK Schools Confront Surge in Cyber Attacks

In recent weeks, a number of UK schools have been targeted by cybercriminals, with some serious incidents underlining the need for comprehensive cyber defenses. But what are the implications, and how worrying is the threat?

What is Content Disarm and Reconstruction (CDR)?
Thought leadership
Company news

What is Content Disarm and Reconstruction (CDR)?

Instead of looking for malicious content, today’s advanced CDR (Content Disarm and Reconstruction) technologies treat all files as untrusted, validating, rebuilding and cleaning each one against their manufacturer’s ‘known-good’ specification.

Protecting against Microsoft’s Zero Day Vulnerability CVE-2023-3688
Threat analysis

Protecting against Microsoft’s Zero Day Vulnerability CVE-2023-3688

Recently Microsoft released a series of patches, addressing several vulnerabilities present within its software. In addition to this it has also published guidance on addressing an Office and Windows HTML remote code vulnerability known as CVE-2023-36884.

Cybersecurity in the Cloud - a Q&A with Glasswall’s Matt Cavey
SecOps

Cybersecurity in the Cloud - a Q&A with Glasswall’s Matt Cavey

Taking a closer look at the unique security risks facing companies in this era of cloud computing, we spoke to Glasswall’s very own Matt Cavey, Director of Cloud Architecture, about challenges, compliance and integrating CDR.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.