ブログ

クリアスウィフトのブログでは、ビジネスのお役に立つ、最新のITセキュリティニュースを取り上げます。

Why Do I Need a Managed File Transfer Solution?

2020/08/21 - 10:56

With data breaches and cyber-attacks seemingly now a daily occurrence, it’s no surprise to see technologies that can help secure sensitive data increasing in popularity and deployment. One such...

続きはこちら Tags: File Transfers Compliance Information Governance

PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email

2020/07/29 - 11:56

An often-overlooked challenge when it comes to PCI compliance are the occasions where customers ‘helpfully’ email their credit card details in an attempt to expedite an order or refund, or when they...

続きはこちら Tags: Compliance Inbound Threats Adaptive Redaction

Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

2020/07/06 - 11:01

As part of our on-going blog series explaining some of the many acronyms and pieces of jargon that bedevil the cybersecurity industry, we turn our attention to optical character recognition...

続きはこちら Tags: Adaptive Redaction Data Breach Compliance
Endpoint blog image

10 things your endpoint security software must allow you to do

2020/04/16 - 16:32

Even during more normal times, there are millions of people all over the world that work remotely or from home regularly. During the current coronavirus crisis, that number has increased dramatically...

続きはこちら Tags: IT Security Endpoint Protection Compliance
Breach that keeps on happening

How to prevent the data breach that keeps on happening

2020/03/11 - 08:08

By Dr Steve Jeffery, pre-sales engineer
The potential for revealing personally identifiable information (PII) in the ‘To’ or ‘CC’ fields of an email is a risk well understood. Yet despite this, it...

続きはこちら Tags: IT Security Internal Threats Compliance
‘Discovering’ Critical Data Stored On The Endpoint

‘Discovering’ Critical Data Stored On The Endpoint

2018/11/08 - 11:22

Ever wondered exactly how much data you have stored on your laptop?  It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from...

続きはこちら Tags:
Unwanted Data Acquisition in Emails

Return to sender: the threat of unwanted sensitive data acquisition via email

2018/11/02 - 10:13

Over 281 billion emails are sent every day. In today’s technology-driven world, email is undoubtedly the main tool for business communication, and it’s estimated that the average employee will...

続きはこちら Tags:
Clearswift Information Governance Server

The Clearswift Information Governance Server: preventing data breaches, supporting compliance

2018/08/16 - 14:30

The latest release of the Clearswift Information Governance Server (IGS) product offers new features and Data Loss Prevention (DLP) functionality, as well as the ability to track unstructured...

続きはこちら Tags: