Resources

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in...
Blog

Microsoft's Defender for Identity – Is it Enough?

In early 2023, Microsoft launched Defender for Identity which aims to offer visibility by helping to identify threats and provide actionable reports on attacks. But M365 security is not completely adequate for the modern enterprise and must be augmented by other data security solutions.
Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Demo

Request a Live Clearswift Secure ICAP Gateway with MFT Demo

Lessen the risk of sharing information in and out of your organization with the Clearswift Secure ICAP Gateway and Managed File Transfer (MFT). This seamless duo provides the management and security you need to keep your business going. Clearswift Secure ICAP Gateway + MFT: Centralized, enterprise-wide managed file transfer Automation and encryption Data redaction ...
Demo

Clearswift Information Governance Server Demo

Data is the heart of every organization, although not all data is created equal. The Information Governance Server provides additional data loss prevention (DLP) features that tracks and traces critical information across the organization. Real-time remediation is applied if a piece of information breaks security policies preventing reputational damage caused by data leaks. ...
Demo

Fortra's Clearswift Secure ICAP Gateway Demo

Ensure your content being uploaded or downloaded from the web or shared via managed file transfer (MFT) solution is being protected from cyber-threat or data loss. The Secure ICAP Gateway provides a seamless integration with existing web proxy infrastructures or MFT solutions, operating bi-directionally to keep Internet data safe and secure. Your live demo will include: ...
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Blog

Clearswift and GoAnywhere Demonstrate Award-Winning File Transfer Technology at RSA

The RSA Conference (RSAC) has long been regarded as one of the information security industry’s biggest and most high-profile gatherings and this year’s event in San Francisco’s Moscone Center from 24 to 28 February 2020, promises to be no different. The delegate and exhibitor lists read like a ‘who’s who’ of information security, with the great and good of the sector in...
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card...
Blog

Paying the Piper: What We Learned From the British Airways Fine

Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward- and reverse-proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog

Like, Share and Destroy: How to Protect Your Business From the Social Media Threat

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses see the importance of using social media to quickly build their brand and reputation, there has been little emphasis on the downside to this. How social media can destroy a company’s reputation in an instant.