The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Clearswift and GoAnywhere demonstrate award-winning file transfer technology at RSA

Monday, February 24, 2020 - 15:12

The RSA Conference (RSAC) has long been regarded as one of the information security industry’s biggest and most high-profile gatherings and this year’s event in San Francisco’s Moscone Center from 24...

Read More Tags:

Don’t let file transfers to and from third parties leave your organization vulnerable

Thursday, November 28, 2019 - 12:03

Visit Clearswift on stand H33 at the International Security Expo in London on 3-4 December to find out more.
The International Security Expo 2019 brings together cybersecurity professionals working...

Read More Tags: Events Cyber Security

NIAS’19 in review by Clearswift CTO, Guy Bunker

Monday, October 21, 2019 - 15:52

Last week, Clearswift was a gold sponsor at NATO’s NIAS’19 three-day cyber security summit in Mons, Belgium, and it was a great event with over 1,800 delegates from 46 nations. Organised by the NCIA...

Read More Tags: Events
CyberUK 2019

Come and see the latest Clearswift technology in action at CYBERUK 2019

Monday, April 15, 2019 - 13:34

CYBERUK, hosted by the National Cyber Security Centre (NCSC), is the UK government’s flagship cybersecurity event. Held at the Scottish Event Campus, Glasgow on 24 – 25 April 2019, it features world-...

Read More Tags: Events
RSA Conference Clearswift

See the latest Clearswift technology in action at RSA 2019

Thursday, February 21, 2019 - 11:34

It’s that time of year when information security professionals from organizations around the globe fly into San Francisco for one of the largest annual Security events – RSA.  The agenda...

Read More Tags:

Clearswift to discuss the “END of Ransomware Attacks”at Orlando and Atlanta Tech-Security Conferences

Tuesday, August 23, 2016 - 09:02

Ransomware and morphed forms of embedded malware are creating havoc for IT security organizations. Weaponized invoices, resumes and other malicious documents are distributed through compelling social...

Read More Tags: