Resources

Blog

Moving on From Encryption – The Case for eDRM

Enterprise digital rights management (eDRM or Information Rights Management, IRM) has had a rocky start to life. While it’s been around for the last 20 years and is seen as the next step on from encryption, it just hasn’t made it into mainstream use.
Blog

Clearswift Wins DLP Award at Computing Security Excellence Awards

Today, we are thrilled to announce our 2019 Computing Security Excellence Award win for Data Loss Prevention (email and web) – the second consecutive win for us at the awards! The Computing Security Excellence Awards celebrate the highest quality cybersecurity products, so it’s fantastic to see our Adaptive Data Loss Prevention (DLP) solution recognized for its market-leading offering. Big Threats...
Blog

Clearswift’s Secure Email Gateway Wins Gold at Golden Bridge Awards

The winners of this year’s Golden Bridge Awards were announced last week, and we are delighted that Clearswift’s Secure Email Gateway was recognized in the ‘Email Security Innovation’ category. The coveted annual awards program celebrates global, cross-industry business achievements and honors the world’s best in organizational performance, products and services, innovations, executives and...
Blog

Defense in Focus: With New Technology Comes New Risk

In any industry, the strive for digital transformation brings with it risk as well as opportunity. This is no more apparent than in the defense sector where several high-profile incidents have exposed vulnerabilities in areas such as email applications and other connected IoT devices.
Press Release

Cybercrime in a post brexit era, will hackers explout our political turmoil

Originally published on teiss.co.uk . Dr. Guy Bunker, CTO at Clearswift, discusses the impact Brexit has had on attitudes towards cyber security spending. In the Brexit era, political uncertainty offers an exceptional opportunity for cybercriminals to exploit the chaos permeating the UK. For many employees, an element of confusion leads to a lack of confidence. And a combination of confusion and...
Press Release

Microsoft Is About to Delete All Your Old Accounts After Just Two Inactive Years

Originally published on forbes.com . I've covered the extent to which cyber risk is an inside threat before. And last year, research from Clearswift suggested that the "true insider threat" which added inadvertent and malicious threats from the extended enterprise makes up 65% in the U.K. and 80% in the U.S of all cybersecurity incidents. And the issue is worse at home. Over-simplified passwords...
Press Release

70% of financial companies suffered a cyber security incident in the last 12 months

Nearly half (43%) of security incidents within the financial sector are caused by employee failure to follow company data protection policies. Other key causes of security incidents include introduction of malware and viruses via 3rd party devices (32%), file and image downloads (25%) and employees sharing data with unintended recipients (24%). Financial organizations rank data loss prevention...
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Press Release

From customer to competitor: Mitigating the financial sector’s chief threats

Originally published on fintechmagazine.com . CTO at Clearswift, Dr. Guy Bunker, discusses his views on the top threats to finance and how to mitigate them. Recent reports show that cyber-attacks on financial services sector rose fivefold in 2018 and in April 2018, seven of the UK's biggest banks suffered major cyber-attacks that forced them to reduce operations or even shut down systems. The...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Press Release

An entire nation just got hacked

Originally posted on CNN.com Excerpt: Asen Genov is pretty furious. His personal data was made public this week after records of more than 5 million Bulgarians got stolen by hackers from the country's tax revenue office. In a country of just 7 million people, the scale of the hack means that just about every working adult has been affected. Read the full article >
Press Release

Bulgaria's Entire Population of 7 Million Just Got Hacked

Originally published on FOX 17 . SOFIA, Bulgaria (CNN) — Asen Genov is pretty furious. His personal data was made public last week after records of more than 5 million Bulgarians got stolen by hackers from the country’s tax revenue office. In a country of just 7 million people, the scale of the hack means that just about every working adult has been affected. We should all be angry. … The...
Press Release

Wounded By The Cutting Edge: Why Firms Must Be Cautious Of Integrating Emerging Tech Solutions

Originally published on businesstelegraph.co.uk . For the last few years, digital transformation within the tech sector has seemed akin to the opening of Pandora’s box : seemingly overnight firms have begun to be bombarded with AI driven solutions, the possibilities of commercial drones, edge computing, cloud storage, and of course the ubiquitous IoT software that can be found everywhere from a...
Press Release

75% of Organisations Have Been Hit by Spear Phishing

Originally published on itgovernance.co.uk . Phishing scams aren’t as compelling as some of the more sophisticated attacks that you read about. But their prosaic nature is part of what makes them so concerning. After all, every unusual email you receive could be a phishing scam, whether it’s an account reset message from Amazon or a work request from your boss. And evidence shows that attacks like...