ブログ

クリアスウィフトのブログでは、ビジネスのお役に立つ、最新のITセキュリティニュースを取り上げます。

How to Protect Your Organization from Advanced Persistent Threats

2020/09/03 - 12:49

Keeping your cyber defense strategies ahead of the game today is no easy task, especially when organizations face a daily proliferation of increasingly evasive cyber-attacks. Advanced persistent...

続きはこちら Tags: Advance Threat Protection Cyber-attacks Inbound Threats Malware Phishing

Why Do I Need a Managed File Transfer Solution?

2020/08/21 - 10:56

With data breaches and cyber-attacks seemingly now a daily occurrence, it’s no surprise to see technologies that can help secure sensitive data increasing in popularity and deployment. One such...

続きはこちら Tags: File Transfers Compliance Information Governance

PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email

2020/07/29 - 11:56

An often-overlooked challenge when it comes to PCI compliance are the occasions where customers ‘helpfully’ email their credit card details in an attempt to expedite an order or refund, or when they...

続きはこちら Tags: Compliance Inbound Threats Adaptive Redaction
Debunking Lexical Expressions

Debunking Cybersecurity Jargon Part Five – What Are Lexical Expression Qualifiers?

2020/07/15 - 09:54

Although in broad terms Clearswift is undoubtedly a technology firm, we always try and use business language rather than technical talk when discussing cybersecurity and how we can help organizations...

続きはこちら Tags: Data Loss Prevention Data Breach Healthcare

Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

2020/07/06 - 11:01

As part of our on-going blog series explaining some of the many acronyms and pieces of jargon that bedevil the cybersecurity industry, we turn our attention to optical character recognition...

続きはこちら Tags: Adaptive Redaction Data Breach Compliance

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

2020/06/18 - 09:00

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners,...

続きはこちら Tags: Cyber-attacks File Transfers Data Breach

Debunking Cybersecurity Jargon Part Three – What is an Information Governance Server?

2020/06/09 - 12:52

To clarify some of the widely used phrases in the cybersecurity sector, we have launched our ‘debunking cybersecurity jargon’ series of blog posts. We have already covered Adaptive Redaction and the...

続きはこちら Tags: Information Governance Data Loss Prevention

Six Step Guide to Email Security Best Practice

2020/06/04 - 13:41

The popularity of email as a collaboration tool shows no sign of abating. In fact, research group Radicati predicts that in 2020 the number of emails sent and received per day will exceed 306 billion...

続きはこちら Tags: Email Security IT Security