Technology Partnerships
19 Aug 2015
Arbit & OPSWAT Offer Safe and Secure Data Flow for High Security Networks
OPSWAT, provider of solutions to secure and manage IT infrastructure, and Arbit Security, specialized in high-end IT security products, today announced their...
We just finished another successful year at Black Hat USA in Vegas. Thankfully our team escaped the Vegas heat within the air-conditioned walls of Mandalay...
As mentioned in the introductory post in this series, topic for discussion is content disarm and reconstruction (CDR), or data sanitization, via file structure...
Email is a critical business tool. Without access to email for even a few hours, a company's productivity is severely hampered. Although email is essential for...
Deep CDR
9 Jul 2015
Deep Content Disarm and Reconstruction (Deep CDR), Part 1: The Case for Data Sanitization
Document-based malware exploits are an incredibly common method for attack. The types of malware distributed via this method are representative of today's...
As BYOD continues to grow in popularity, organizations will have to focus more resources on the protection of endpoint devices and the associated risks those...
Nearly half of financial services respondents (46%) cited cyber risk as the single biggest threat to the financial industry, and 80% listed it as one of the...

- Infographic: File Upload Security – A Mission Against Malware
- File Upload Protection – 10 Best Practices for Preventing Threats
- Can You Spot the Social Engineering Techniques in a Phishing Email?
- We Released an Advanced Email Security Comparison Guide
- Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- Police Handing Out Malware-Infected USBs Is Not an Isolated Incident
- 10 Things to Include in Your Employee Cyber Security Policy
- 11 of the Largest Data Breaches of All Time (Updated)