Guide
Augmenting Existing Security Infrastructure
Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Guide
Critical Data Protection
Depending where you are in the world, there is a term for the loss of information from an organization – data loss, data leak, data theft, or even data spill.
Guide
Preventing Unwanted Sensitive Data Acquisition on The Corporate Network
This guide explores the risks of sensitive data acquisition through the three most widely used digital business collaboration channels: email, mobile, and the Internet.
Blog
Will Social Engineering Lures Become Even More Common in 2021?
Mon, 05/24/2021
With the world starting to open back up again, it provides an even greater opportunity for cyber-criminals to use social engineering lures to gain access to corporate systems.
Blog
Data Security Best Practices Every CISO Should Know
Thu, 04/29/2021
The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch.
Blog
10 Tips to Protect Your Company’s Data in 2021
Thu, 01/21/2021
When thinking about data security strategies in 2021, here are 10 tips to keep in mind.
Blog
2020 - A Transformational Year in Cybersecurity
Tue, 12/22/2020
What challenges did 2020 present for cybersecurity and what can we expect in the coming new year?
Guide
Controlling Classified Information in UK Public Sector
This guide demonstrates how organizations can use Clearswift's Secure Email and Web Gateways alongside Boldon James or Titus data classification tools to effectively control and manage their data.
Blog
Pair GoAnywhere MFT with Clearswift to Elevate Your Cybersecurity Stance
Tue, 04/14/2020
Optimize and secure your data file transfers with GoAnywhere managed file transfer (MFT) technology and the Clearswift Secure ICAP Gateway.
Blog
Clearswift Wins DLP Award at Computing Security Excellence Awards
Mon, 11/25/2019
Today, we are thrilled to announce our 2019 Computing Security Excellence Award win for Data Loss Prevention (email and web) – the second consecutive win for us at the awards! The Computing Security Excellence Awards celebrate the highest quality cybersecurity products, so it’s fantastic to see our Adaptive Data Loss Prevention (DLP) solution recognized for its market-leading...
Blog
5 Cyber Security Threats You Didn’t Know You Should Be Threatened By
Mon, 10/21/2019
High profile hacks over the last few months have put large organizations front and center of a media frenzy that highlights the dangers of inadequate data protection.
Blog
Defense in Focus: With New Technology Comes New Risk
Fri, 09/06/2019
In any industry, the strive for digital transformation brings with it risk as well as opportunity. This is no more apparent than in the defense sector where several high-profile incidents have exposed vulnerabilities in areas such as email applications and other connected IoT devices.
Blog
Capital One Data Breach: A Reminder to Lock Your Back Door
Tue, 08/13/2019
In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.”
This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card...
Blog
The Top 3 Emerging Technologies Posing a Cyber-Threat to our Critical National Infrastructure
Wed, 07/17/2019
It is vital that security measures match that of the technology introduced such as AI, 5G, and the Internet of Things.
Blog
Paying the Piper: What We Learned From the British Airways Fine
Sat, 06/15/2019
Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward- and reverse-proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Blog
Next Generation Cyber Threats: Images
Fri, 05/31/2019
Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first version of Adaptive Redaction in 2013 and have continuously improved the technology in every release since then.
Blog
From Pesky to Dangerous - Image-based Spam
Tue, 05/21/2019
Those of you that can remember back to 2006 may recall that High School Musical was the highest selling album of the year. “We’re all in this together” was one of the most popular songs played at the time and, some would say, a pesky tune that would stick in your head.
It also happened to be the same time when image-based spam was at its peak, another pesky occurrence that was...
Blog
The Top 5 Cyber Threats that Brexit Brings
Tue, 05/14/2019
Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog
Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss
Tue, 04/02/2019
Sun Tzu once stated that: “The supreme art of war is to subdue the enemy without fighting” and two and a half thousand years later his rhetoric stands the test of time, as today we are seeing this ancient ideal applied in the most modern of battlegrounds: the fight against cyber-crime.
To tackle both the malicious and accidental data loss threat, organizations need to have...