Featured article

An international team, consisting of security researchers, has created a computer worm capable of automatic self-replication and targeting AI applications. It can compromise emails, distribute malware and steal data. Its name, Morris II

Continue reading
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Exploring secure software development at Glasswall: the fortification of container images

SecOps

Exploring secure software development at Glasswall: the fortification of container images

In the world of cybersecurity, stands as a critical line of defense against malicious content. By systematically analyzing and neutralizing potential threats within files, CDR technology ensures that only safe, sanitized content enters an organization's network.

Closing the firewall cybersecurity protection gap

Thought leadership

Closing the firewall cybersecurity protection gap

In recent years, the sheer variety and sophistication of cyber attacks have exacted a huge cost on individuals and organizations the world over. One recent study put the total global cost of cybersecurity incidents at a mind-boggling $8 trillion...

An inspiring story on International Women’s Day – Glasswall’s Lynn Randall

Company news

An inspiring story on International Women’s Day – Glasswall’s Lynn Randall

On International Women's Day 2024, we are profiling Lynn Randall, Glasswall's Company Secretary, who brings an inspiring story to this year's event. With a varied career spanning nearly half a century, she is ideally placed to share her insight about how the world of work has evolved for women, and how her own career change at the age of 50 offers an example to others.

The impact of AI on cybersecurity – opportunities and risks

Thought leadership

The impact of AI on cybersecurity – opportunities and risks

In an era where cyber threats evolve as rapidly as the technology designed to counter them, Artificial Intelligence (AI) has quickly emerged as a major force in the future direction of both good and bad actors.

10 reasons why you need Content Disarm and Reconstruction

Thought leadership

10 reasons why you need Content Disarm and Reconstruction

In the contemporary digital landscape, organizations face an ever-increasing challenge of protecting their digital assets from a variety of file-based cybersecurity threats.

Glasswall's Commitment to the Armed Forces Covenant

Company news

Glasswall's Commitment to the Armed Forces Covenant

Glasswall is proud to support the UK Armed Forces community by signing the Armed Forces Covenant.

Secure your web content traffic and downloads with the Glasswall and Menlo Security integration

Company news

Secure your web content traffic and downloads with the Glasswall and Menlo Security integration

In an era where digital threats loom at every click, the Glasswall and Menlo Security integration provides a robust shield for your online activities.

AI in Cybersecurity: Key insights from Glasswall's Security Data Scientist, Dr. Aqib Rashid

Thought leadership

AI in Cybersecurity: Key insights from Glasswall's Security Data Scientist, Dr. Aqib Rashid

Discover how AI is changing the cybersecurity landscape as we share a conversation with Glasswall’s Security Data Scientist, Dr. Aqib Rashid.

Defending the future: a guide to fortifying AI against data poisoning attacks

Thought leadership

Defending the future: a guide to fortifying AI against data poisoning attacks

Data poisoning attacks: What are they and why do they matter?

How to protect your organization against file-based threats with Glasswall Meteor 

Company news

How to protect your organization against file-based threats with Glasswall Meteor 

So, you want to keep your organization secure from file-based threats, but don’t have the time to deal with complicated security deployments and can’t accept the protect gaps left by detection-based solutions? Don’t worry — we have you covered.

Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection

Thought leadership

Threat analysis

Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection

In the digital era, ransomware has evolved into a sophisticated and formidable threat to global cybersecurity. Recent insights from the UK’s National Cyber Security Centre (NCSC) and initiatives like the White House's International Counter Ransomware Initiative (CRI) highlight the complexity of this ongoing challenge.

Protecting against Adobe’s Zero Day Vulnerability CVE-2023-21608

Threat analysis

Protecting against Adobe’s Zero Day Vulnerability CVE-2023-21608

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) added a new Adobe Acrobat Reader vulnerability to its catalog - CVE-2023-21608.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.