Image
domino image

Why Supply Chains Are Today’s Fastest Growing Cybersecurity Threat

Feb 16, 2021
Why is supply chain cybersecurity important and what can organizations do to reduce risk? In this blog post, we look at the policies, technologies and training programs needed for a robust supply chain risk management strategy.
Image
Public Sector Cybersecurity

Public Sector Cybersecurity Priorities in 2021

Feb 3, 2021
The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Image
Lock

10 Tips to Protect Your Company’s Data in 2021

Jan 21, 2021
When thinking about data security strategies in 2021, here are 10 tips to keep in mind.
Image
Lock

2020 - A Transformational Year in Cybersecurity

Dec 22, 2020
What challenges did 2020 present for cybersecurity and what can we expect in the coming new year?
Image
AWS

Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace

Dec 4, 2020
Now, with Version 5, customers can install a complete Secure Email or ICAP Gateway from the AWS Marketplace.
HelpSystems Logo

How Data Classification Helps Organizations Maintain a Strong Data Security Posture

Dec 1, 2020
To further protect employees and sensitive data, the onus is also on organizations to invest in technologies that help stop the inadvertent and accidental misuse of data. The foundations of a strong data security posture start with data classification tools.
Image
 data exfiltration

How to Prevent Data Exfiltration

Nov 13, 2020
To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Image
Persistant Threats

How to Protect Your Organization from Advanced Persistent Threats

Sep 3, 2020
The motivations for APT attacks are many and varied. Nation state sponsored, industrial espionage and targeted attacks are primarily designed not to cause disruption, but to steal information.
Image
MFT solution

Why Do I Need a Managed File Transfer Solution?

Aug 21, 2020
Why are MFT solutions fast becoming an essential part of an organization’s cybersecurity strategy and what benefits do they bring?
Image
PCI Compliance

Emailing Credit Card Information: Why Redaction is Crucial for PCI Compliance

Jul 29, 2020
Find out how the Clearswift Secure Email Gateway transforms email from a high-risk communication channel to one that’s PCI compliant.
Image
Debunking Lexical Expressions Thumbnail

Debunking Cybersecurity Jargon Part Five – What Are Lexical Expression Qualifiers?

Jul 15, 2020
Find out how Lexical Expression Qualifiers can be used to eliminate the false positives typically associated with data loss prevention solutions.
Image
redacted document

Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

Jul 6, 2020
Find out how OCR addresses an important cybersecurity risk for organizations – the threat of image-based data loss.
Image
Information governance server

Debunking Cybersecurity Jargon Part Three – What is an Information Governance Server?

Jun 9, 2020
Clearswift’s IGS enables organizations to identify, manage and protect critical unstructured data as it is circulated within the organization and across its boundary.
Image
Email security

Six Step Guide to Email Security Best Practice

Jun 4, 2020
To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Image
email encryption

What Type of Email Encryption is Right for Your Organization?

Jun 2, 2020
Encrypting emails offers the highest level of security for your organization’s data. TLS, S/MIME, PGP or portal-based encryption, we take a look at the options available.
Image
data breach

Another Day, Another Significant Data Breach – What We Know About the EasyJet Cyber-attack

May 28, 2020
Clearswift asks what made EasyJet vulnerable to a cyber-attack and how can organizations ensure their customers’ data privacy?
Image
unknown threat report

New Clearswift Report Highlights Areas of Cybersecurity Improvement for UK Public Sector

May 19, 2020
New research suggests a lack of awareness of ransomware and cybersecurity best practices in the UK Public Sector leaves it vulnerable to further attacks.
Image
magnifying glass on keyboard

Debunking Cybersecurity Jargon Part Two – What is a Deep Content Inspection Engine?

May 14, 2020
At the heart of all Clearswift’s cybersecurity solutions, the Deep Content Inspection Engine is essentially a system for filtering content and applying intelligent rules.
Image
What is Adaptive Redaction thumbnail

Debunking Cybersecurity Jargon Part One – What is Adaptive Redaction?

Apr 24, 2020
We’re launching a series of blogs that aim to explain certain cybersecurity industry terms and phrases. First up, what is Adpative Redaction?